Closed
Bug 557340
Opened 14 years ago
Closed 14 years ago
Allow non-chrome-privileged Components.utils.Sandbox instances to exist in separate processes
Categories
(Core :: IPC, defect)
Tracking
()
RESOLVED
DUPLICATE
of bug 556846
People
(Reporter: avarma, Unassigned)
References
Details
(Whiteboard: [jetpack])
For Jetpack, we'll need to be able to execute semi-privileged extension code in their own sandboxes, which should be able to exist in separate processes. Authority will be provided to them via CPOWs/reverse-CPOWs (see bug 557259) that are effectively injected into the sandbox via require().
Reporter | ||
Updated•14 years ago
|
Summary: Allow unprivileged Components.utils.Sandbox instances to exist in separate processes → Allow non-chrome-privileged Components.utils.Sandbox instances to exist in separate processes
Reporter | ||
Updated•14 years ago
|
Whiteboard: [jetpack]
Comment 1•14 years ago
|
||
I think you could file this as "create a jetpack process type and make it work". Currently we're using content processes, but that's definitely incorrect. However, I think we need to look at this a little. Currently you have a JS scope for the jetpack itself (a sandbox scope), and you have a JS scope for the jetpack implementation (a chrome scope). I think for multi-process you're going to need a third scope: jetpack process: Jetpack itself jetpack process: jetpack implementation code that needs to run in the jetpack process firefox process: jetpack implementation code that needs to run in the firefox process Also remember that the jetpack process isn't going to be using XPCOM.
Reporter | ||
Comment 2•14 years ago
|
||
This was resolved by bug 556846, so I'm marking it as duplicate.
Status: NEW → RESOLVED
Closed: 14 years ago
Resolution: --- → DUPLICATE
You need to log in
before you can comment on or make changes to this bug.
Description
•