Closed
Bug 711618
Opened 12 years ago
Closed 12 years ago
implement basic click to play permission model
Categories
(Core Graveyard :: Plug-ins, enhancement)
Core Graveyard
Plug-ins
Tracking
(firefox14 fixed)
RESOLVED
FIXED
mozilla14
Tracking | Status | |
---|---|---|
firefox14 | --- | fixed |
People
(Reporter: keeler, Assigned: jaws)
References
(Blocks 1 open bug)
Details
(Keywords: privacy, Whiteboard: [secr:curtisk])
Attachments
(3 files, 7 obsolete files)
7.41 KB,
patch
|
Felipe
:
review+
|
Details | Diff | Splinter Review |
2.44 KB,
patch
|
jaas
:
review+
|
Details | Diff | Splinter Review |
22.44 KB,
patch
|
Felipe
:
review+
blassey
:
approval-mozilla-central+
|
Details | Diff | Splinter Review |
+++ This bug was initially created as a clone of Bug #711552 +++ limi: "If you've activated a click-to-play plugin on a certain URL 3 times, make it activate on subsequents loads *of that page* (to handle the intranet/bank Java app use case)", "…and the way to clear the "click to play -> automatic after 3 times" is to change the state of that plugin to either always on or always off and then back to click-to-play. This avoids having a management interface for the list of URLs that will always load. :P" gkn: "When a page is removed from the history (and isn't bookmarked) it should also be removed from this list." Question: what's a good way to store this list of URLs/plugins?
![]() |
Reporter | |
Updated•12 years ago
|
Assignee: nobody → dkeeler
Comment 1•12 years ago
|
||
This should be per-origin, not per-URL.
Comment 2•12 years ago
|
||
I'm not convinced. I go to youtube a lot, and I'll probably choose to play at least three videos on youtube, but I don't want youtube videos to load automatically.
Comment 3•12 years ago
|
||
This reminds me of bug 682455 and it does have security consequences since we know that plugins are often a frequent (successful) target for exploitation. Also, don't we already have about:permissions for a management interface for this ?
Comment 4•12 years ago
|
||
If a site repeatedly provides useful content through plugins, it's not especially likely to attack you the 4th time. And the user is likely to click through, like they did the first 3 times. Would you be happier if the permission went away after 30 days of not being used?
Comment 5•12 years ago
|
||
(In reply to Jesse Ruderman from comment #4) > If a site repeatedly provides useful content through plugins, it's not > especially likely to attack you the 4th time. And the user is likely to > click through, like they did the first 3 times. ok, these are good points. (In reply to David Keeler from comment #0) "…and the way to clear the "click to play -> automatic after 3 times" is to change the state of that plugin to either always on or always off and then back to click-to-play. (In reply to David Keeler from comment #0) > +++ This bug was initially created as a clone of Bug #711552 +++ > > limi: "If you've activated a click-to-play plugin on a certain URL 3 times, > make it activate on subsequents loads *of that page* (to handle the > intranet/bank Java app use case)", "…and the way to clear the "click to play > -> automatic after 3 times" is to change the state of that plugin to either > always on or always off and then back to click-to-play. This avoids having a > management interface for the list of URLs that will always load. :P" does this mean disable and re-enable the plugin in the Add-On Manager ? > gkn: "When a page is removed from the history (and isn't bookmarked) it > should also be removed from this list." what's the link between clearing history and resetting plugin click to play permissions ?
![]() |
Reporter | |
Comment 6•12 years ago
|
||
(In reply to Ian Melven :imelven from comment #5) > > limi: "If you've activated a click-to-play plugin on a certain URL 3 times, > > make it activate on subsequents loads *of that page* (to handle the > > intranet/bank Java app use case)", "…and the way to clear the "click to play > > -> automatic after 3 times" is to change the state of that plugin to either > > always on or always off and then back to click-to-play. This avoids having a > > management interface for the list of URLs that will always load. :P" > > does this mean disable and re-enable the plugin in the Add-On Manager ? That's my understanding. It would be something like "click to play" -> "disable" -> "click to play" (or "click to play" -> "enable" -> "click to play"). This would reset all of the sites for that plugin. > > gkn: "When a page is removed from the history (and isn't bookmarked) it > > should also be removed from this list." > > what's the link between clearing history and resetting plugin click to play > permissions ? My understanding is if a page is removed from history, a plugin that had been click-to-played on that page >= 3 times will go back to click-to-play. However, if this feature is on a per-site basis rather than a per-URL basis, this won't work unless all pages from that site are removed from history.
Comment 7•12 years ago
|
||
(In reply to David Keeler from comment #6) > > > > does this mean disable and re-enable the plugin in the Add-On Manager ? > > That's my understanding. It would be something like "click to play" -> > "disable" -> "click to play" (or "click to play" -> "enable" -> "click to > play"). This would reset all of the sites for that plugin. > Wait ? What? You mean to use the feature one will have to open the Addon manager ? I had assumed there would be a marker or something on the site visited similar to the way Flashblock works for example that can be 'clicked' to play a flash object. If one has to open the Addon manager every-time one wants to view a flash video for each site this feature will be virtually useless as it will be become quickly very annoying to jump to Addon manager. I understand that after 3 times it will be automatic, but still for each site to have to leap around to 'click to play' ? And as stated above what about those users that never want flash objects to play unless clicked ? Some flash ads are so poorly written they 'eat cpu' thus the reason for full-time blocking.
Comment 8•12 years ago
|
||
I think users will understand "always load this plugin for this site" much better than they will understand "it works automatically after three times." Especially in China it is common to have site-specific plugins. For example, banks and many e-commerce sites (eBay and amazon.com analogs) have plugins specific to their site. These are sites that are used by basically everybody in China. In particular, it is common to use plugins to implement a "secure login" form that attempts to prevent keyloggers from stealing the user's password. AFAICT, the login form is often on multiple pages of the site, and users expect to be able to log in easily on any page of the site. We are working now to make these plugins work better (e.g. bug 611253) and be less confusing to end-users, to help with adoption of Firefox in China; my concern is that the proposed policy will make things more confusing than necessary, and make new Firefox users think Firefox is less convenient than other browsers. I think that having a per-origin auto-load setting and making it an explicit choice ("enable now" and "always enable for this site") would be a lot less confusing. (And, the same applies to geo-location prompting.) We should not be afraid of site-specific settings. With WebAPIs, we are going to be asking users to enable MANY features on a per-site/origin basis. We have to make a usable UI for site-specific settings anyway; in fact, I thought we already had a UI design for site-specific settings ready to go. We might as well start doing it with this (and geolocation).
Keywords: dev-doc-needed
![]() |
Reporter | |
Comment 9•12 years ago
|
||
I agree that having the option to "load this time" or "always load for this site" make more sense. Here's a patch for how that could work. limi/UX team: input?
Updated•12 years ago
|
Keywords: dev-doc-needed
Comment 10•12 years ago
|
||
(In reply to Jesse Ruderman from comment #4) > If a site repeatedly provides useful content through plugins, it's not > especially likely to attack you the 4th time. And the user is likely to > click through, like they did the first 3 times. Blocking plugins can help resist attacks, but that's not the only reason. As comment 7 points out, performance is a very good reason not to load plugins media by default. Another reason is that it can just be annoying: I hate opening a tab in the background and having sound start to play. Any non-obvious behavior like changing the default after three accepts, or only being able to remove the preference by removing the site from history creates a bad UX. We should default to well-understood concepts like Allow Once / Allow Always, and integrate this feature into the up-and-coming site-specific preferences manager which currently lives at about:permissions.
Target Milestone: --- → mozilla11
Comment 11•12 years ago
|
||
Yeah, I'd prefer an explicit "always" action over this automatic behavior. And we need plugin activation to be based on context menus rather than single-left-click anyway, for basic safety, so there's plenty of space to put an "always" option. (It's fine with me if left-click opens a context menu in this case, fwiw.)
![]() |
Reporter | |
Comment 12•12 years ago
|
||
Here's the latest: * this builds on bug 711552 (so, no hanger unless necessary, etc.) * adds the option to always play a given plugin for the current site (still left/right click / menu-based) * when loading a plugin, if the user has indicated that it should always play on that site, load it and only it (this means that new invisible plugins won't be played, but old ones that were present when the permission was set will be)
Attachment #582909 -
Attachment is obsolete: true
![]() |
Reporter | |
Updated•12 years ago
|
Summary: implement click to play -> automatic play after 3 times (per URL/plugin) → implement click to play permission model
need to schedule a secteam review
Whiteboard: [secr:curtisk]
Comment 14•12 years ago
|
||
"Left-click menu" is the right UI when this is being used as a security measure. But for some plugins/users, it might be used only as an anti-annoyance measure, in which case it would be good to have a "Left-click play" implemented as well.
Comment 15•12 years ago
|
||
(In reply to Jesse Ruderman from comment #14) > "Left-click menu" is the right UI when this is being used as a security > measure. You mean right-click (context) menu, I assume? But more generally, as a security measure it just needs to be some place in chrome where context can't get at (or easily trick a user into doing)
Comment 16•12 years ago
|
||
I mean that left-clicking should do the same thing as right-clicking. Chrome UI would be even more secure, yes.
Assignee | ||
Updated•12 years ago
|
Blocks: click-to-play
Assignee | ||
Comment 18•12 years ago
|
||
This implements a basic permissions model of click to play plugins on a per-site basis through the plugin popup-notification doorhanger. Settings can be modified through about:permissions. This patch doesn't implement an expiring permission or a rolling window for the permissions as has been discussed in the mailing lists [1]. There is also no ability to remember settings through the overlay. We could land this patch as-is as an intermediate step on our way to click-to-play plugins and refine our permissions model when we reach a decision that we are happy with. Curtis, are you OK with landing this as-is as an intermediate step? [1] https://groups.google.com/forum/#!topic/mozilla.dev.security/DzCnFBMIPNI
Assignee: dkeeler → jwein
Attachment #585342 -
Attachment is obsolete: true
Status: NEW → ASSIGNED
Attachment #612462 -
Flags: review?(felipc)
Attachment #612462 -
Flags: review?(curtisk)
Comment 19•12 years ago
|
||
Permissions are handled in Page Info > Permissions. about:permissions as a work in progress is still hidden from the user.
Assignee | ||
Updated•12 years ago
|
Attachment #612462 -
Flags: review?(felipc)
Attachment #612462 -
Flags: review?(curtisk)
Comment 20•12 years ago
|
||
(In reply to Jared Wein [:jaws] from comment #18) > Created attachment 612462 [details] [diff] [review] > Patch for bug > > This implements a basic permissions model of click to play plugins on a > per-site basis through the plugin popup-notification doorhanger. Settings > can be modified through about:permissions. > > This patch doesn't implement an expiring permission or a rolling window for > the permissions as has been discussed in the mailing lists [1]. There is > also no ability to remember settings through the overlay. > > We could land this patch as-is as an intermediate step on our way to > click-to-play plugins and refine our permissions model when we reach a > decision that we are happy with. > > Curtis, are you OK with landing this as-is as an intermediate step? > > [1] https://groups.google.com/forum/#!topic/mozilla.dev.security/DzCnFBMIPNI FWIW, personally i don't see a problem with landing this if it's disabled by default. I think having a prototype to show and discuss will help get UX and Product feedback and help us get closer to a decision on what we actually want click to play to be. I do think the feature shouldn't be enabled in a release until it's closer to what's been discussed. Thanks for your continued awesome work on this, Jared :)
Comment 21•12 years ago
|
||
(In reply to Ian Melven :imelven from comment #20) > I think having a prototype to show and discuss will help get UX and > Product feedback and help us get closer to a decision on what we actually > want click to play to be. and hopefully some user testing/feedback too, of course !
Assignee | ||
Comment 22•12 years ago
|
||
This patch makes plugin permissions accessible from the Page Info > Permissions dialog.
Attachment #612462 -
Attachment is obsolete: true
Attachment #612754 -
Flags: review?(felipc)
Assignee | ||
Comment 23•12 years ago
|
||
Pushed to tryserver: https://tbpl.mozilla.org/?tree=Try&rev=6dc9c22a6534
Attachment #612755 -
Flags: review?(felipc)
Assignee | ||
Comment 24•12 years ago
|
||
Fixed the two test failures in browser_permissions.js.
Attachment #612755 -
Attachment is obsolete: true
Attachment #612755 -
Flags: review?(felipc)
Attachment #612767 -
Flags: review?(felipc)
Comment 25•12 years ago
|
||
Thanks for this! too i also have traded Flashblock for plugins.click_to_play;true But by when it will be stable enough to test? will it have the option to control(enable on demand) for all types of plugins? & what about say a page has two flash player windows but want to play only the second one will it be possible ? (flashblock allows this)
Assignee | ||
Comment 26•12 years ago
|
||
Comment on attachment 612754 [details] [diff] [review] Patch for bug v2 I'm going to update nsObjectLoadingContent so it automatically activates the plugin (and doesn't dispatch the PluginClickToPlay event) if the ownerDocument.location has permissions or if the ownerWindow.top.location has permissions. This will help users who visits YouTube.com, gives permissions so plugins will auto-activate when browsing YouTube.com, and then visit another site who has a YouTube iframe.
Attachment #612754 -
Flags: review?(felipc) → feedback?(felipc)
Assignee | ||
Comment 27•12 years ago
|
||
Don't dispatch PluginClickToPlay if the permissions are set to Always Allow for the current site.
Attachment #613804 -
Flags: feedback?(joshmoz)
Assignee | ||
Comment 28•12 years ago
|
||
Comment on attachment 612754 [details] [diff] [review] Patch for bug v2 I talked with Felipe more about this and he mentioned that changing how we respect the permissions could create scenarios where some plugins auto-activate while others don't. I've put the platform changes in part 2 of the patches for this bug.
Attachment #612754 -
Flags: feedback?(felipc) → review?(felipc)
Comment 29•12 years ago
|
||
Comment on attachment 612754 [details] [diff] [review] Patch for bug v2 Review of attachment 612754 [details] [diff] [review]: ----------------------------------------------------------------- - it's not clear yet to me that the _reshowNotification case is correct in all situations, I'll look at it again on the next patch iteration - the pageinfo and aboutPermissions selectors should only display if the feature is enabled, otherwise setting a site-based value would be misleading as it would have no effect. But I like how the global entry on about:permissions control the pref. - only using testPermission once per page would be nice although I now think it's too much early optimization to worry about that, specially if trying to do that also for the backend patch (the change would be simple in the front-end) ::: browser/base/content/browser.js @@ +7246,5 @@ > _handleClickToPlayEvent: function PH_handleClickToPlayEvent(aPlugin) { > let doc = aPlugin.ownerDocument; > let browser = gBrowser.getBrowserForDocument(doc.defaultView.top.document); > + let topURI = Services.io.newURI(browser.contentWindow.location.href, null, null); > + let pluginsPermission = Services.perms.testPermission(topURI, "plugins"); no need to create a new uri here, just use browser.currentURI @@ +7250,5 @@ > + let pluginsPermission = Services.perms.testPermission(topURI, "plugins"); > + let overlay = doc.getAnonymousElementByAttribute(aPlugin, "class", "mainBox"); > + > + if (browser._clickToPlayPluginsActivated || > + pluginsPermission == Ci.nsIPermissionManager.ALLOW_ACTION) { the ALLOW_ACTION condition can go away as it should never happen with the platform changes @@ +7255,5 @@ > let objLoadingContent = aPlugin.QueryInterface(Ci.nsIObjectLoadingContent); > objLoadingContent.playPlugin(); > return; > + } else if (pluginsPermission == Ci.nsIPermissionManager.DENY_ACTION) { > + overlay.style.visibility = "hidden"; can you create a class and set hidden through css? or does the anonymous content make this not simple to do? @@ +7281,5 @@ > gPluginHandler._showClickToPlayNotification(browser); > }, > > _showClickToPlayNotification: function PH_showClickToPlayNotification(aBrowser) { > aBrowser._clickToPlayDoorhangerShown = true; this should only be set after the return @@ +7285,5 @@ > aBrowser._clickToPlayDoorhangerShown = true; > let contentWindow = aBrowser.contentWindow; > + > + let topURI = Services.io.newURI(aBrowser.contentWindow.location.href, null, null); > + let pluginsPermission = Services.perms.testPermission(topURI, "plugins"); same here and below (about aBrowser.currentURI) @@ +7310,5 @@ > + callback: function () { > + Services.perms.add(cwURI, "plugins", Ci.nsIPermissionManager.DENY_ACTION); > + let notification = PopupNotifications.getNotification("click-to-play-plugins", gBrowser.selectedBrowser); > + if (notification) > + notification.remove(); no need to remove the notification, it will be automatically removed
Attachment #612754 -
Flags: review?(felipc)
Assignee | ||
Comment 30•12 years ago
|
||
These platform changes will auto-activate plugins if the permissions allow it for the site without firing unnecessary PluginClickToPlay events.
Attachment #613804 -
Attachment is obsolete: true
Attachment #613804 -
Flags: feedback?(joshmoz)
Attachment #613867 -
Flags: review?(joshmoz)
Comment 31•12 years ago
|
||
Guys will this be also implemented so that ogg or web-m to require to be licked to be activated this is needed to stop loading unnecessary plugins on any page(inbuilt or external) especially under linux & also speeds up Firefox
Comment 32•12 years ago
|
||
(In reply to beelzebub360 from comment #31) > Guys will this be also implemented so that ogg or web-m to require to be > licked to be activated This bug is just for plug-ins and built-in ogg/webm support is not considered a plug-in. While not identical because we will still fetch some metadata, if you want to always click-to-play media, you can set media.autoplay.enabled to false on about:config.
Assignee | ||
Comment 33•12 years ago
|
||
Thanks for the thorough review. I found and fixed an issue with reshowNotifications if plugins had already been activated on the page. (In reply to Felipe Gomes (:felipe) from comment #29) > @@ +7255,5 @@ > > let objLoadingContent = aPlugin.QueryInterface(Ci.nsIObjectLoadingContent); > > objLoadingContent.playPlugin(); > > return; > > + } else if (pluginsPermission == Ci.nsIPermissionManager.DENY_ACTION) { > > + overlay.style.visibility = "hidden"; > > can you create a class and set hidden through css? or does the anonymous > content make this not simple to do? Using a class here would break instances where getAnonymousElementByAttribute(elem, "class", ...) is used. > @@ +7281,5 @@ > > gPluginHandler._showClickToPlayNotification(browser); > > }, > > > > _showClickToPlayNotification: function PH_showClickToPlayNotification(aBrowser) { > > aBrowser._clickToPlayDoorhangerShown = true; > > this should only be set after the return I intentionally placed this before any of the early returns since if plugins are set to be denied for the page, there is no sense in checking this on each PluginClickToPlay event.
Attachment #612754 -
Attachment is obsolete: true
Attachment #614173 -
Flags: review?(felipc)
Assignee | ||
Updated•12 years ago
|
Target Milestone: mozilla11 → ---
Comment 34•12 years ago
|
||
Comment on attachment 613867 [details] [diff] [review] Patch for bug (part 2, platform changes) Review of attachment 613867 [details] [diff] [review]: ----------------------------------------------------------------- I'm not really reviewing for the bigger-picture experience here, code-wise this looks fine.
Attachment #613867 -
Flags: review?(joshmoz) → review+
It looks like the permission is just "plug-ins" as opposed to "plug-in Foo". I think plug-ins should be enabled on a per plug-in type basis. It's relatively rare for a site to use multiple different plug-ins, so the case where a user wants to enable e.g. both Flash and Java for a site should be rare. However, if a site has managed to bait me into enabling Flash for the site in order to watch a video, I don't want Java-based exploit kits that someone has dropped on the site to activate, too.
Comment 36•12 years ago
|
||
Comment on attachment 614173 [details] [diff] [review] Patch for bug v3 Review of attachment 614173 [details] [diff] [review]: ----------------------------------------------------------------- Note: there are carriage returns in both patches (some \r already got in with bug 711552, you can fix them all in this landing) ::: browser/base/content/browser.js @@ +7279,5 @@ > + let pluginNeedsActivation = plugins.some(function(plugin) { > + let objLoadingContent = plugin.QueryInterface(Ci.nsIObjectLoadingContent); > + return !objLoadingContent.activated; > + }); > + if (plugins.length && pluginNeedsActivation) no need to check for length, plugins.some() should return false for an empty array @@ +7289,5 @@ > let contentWindow = aBrowser.contentWindow; > + > + let pluginsPermission = Services.perms.testPermission(aBrowser.currentURI, "plugins"); > + if (pluginsPermission == Ci.nsIPermissionManager.DENY_ACTION) > + return; instead of checking this here, check on both callers and don't call it if permission == DENY. That's because _handleClickToPlay already have the information so it's a waste to immediately test the permission again. But you'll then need to test it at the reshowClickToPlay function ::: browser/components/preferences/aboutPermissions.js @@ +361,5 @@ > + } > + return this.ALLOW; > + }, > + set plugins(aValue) { > + let value = (aValue != this.DENY); plugins don't have a global deny, so this is always true. the correct should be aValue != this.ALLOW @@ +407,1 @@ > I believe you also need to add an entry for the default plugin value here: http://mxr.mozilla.org/mozilla-central/source/browser/components/preferences/aboutPermissions.js#283 @@ +445,5 @@ > this._observersInitialized = true; > Services.obs.notifyObservers(null, "browser-permissions-preinit", null); > + > + document.getElementById("plugins-pref-item").hidden = > + !Services.prefs.getBoolPref("plugins.click_to_play"); the plugins entry should always be visible in the global pane, as it's just controlling the pref. It needs to be hidden from the site-specific views if the pref is in its default state ("Allow")
Attachment #614173 -
Flags: review?(felipc)
Updated•12 years ago
|
Attachment #612767 -
Flags: review?(felipc) → review+
Comment 37•12 years ago
|
||
As a suggestion to ease people complaining and bitching there favourite websites aren't working.. can we can some pre-added domains like youtube.com hulu.com netflix.com .. etc
Comment 38•12 years ago
|
||
(In reply to mdew from comment #37) > As a suggestion to ease people complaining and bitching there favourite > websites aren't working.. can we can some pre-added domains like > > youtube.com > hulu.com > netflix.com > .. etc One of the main reasons I use click-to-play (in Nightly and Chrome) is that I can open up lots of YouTube videos and different tabs and they won't all start playing or buffering at once. I would therefore suggest not shipping a default whitelist. If you disagree, please file a new bug as a followup to this one as that isn't the focus here.
Assignee | ||
Comment 39•12 years ago
|
||
Fixed the issues that you mentioned and changed about:permissions to use the plugin icon.
Attachment #614173 -
Attachment is obsolete: true
Attachment #614951 -
Flags: review?(felipc)
Comment 40•12 years ago
|
||
Comment on attachment 614951 [details] [diff] [review] Patch for bug v4 Review of attachment 614951 [details] [diff] [review]: ----------------------------------------------------------------- ::: browser/base/content/browser.js @@ +7262,5 @@ > if (aEvent.button == 0 && aEvent.isTrusted) > gPluginHandler.activatePlugins(aEvent.target.ownerDocument.defaultView.top); > }, true); > > if (!browser._clickToPlayDoorhangerShown) if (!browser._clickToPlayDoorhangerShown && pluginsPermission != Ci.nsIPermissionManager.DENY_ACTION)
Attachment #614951 -
Flags: review?(felipc) → review+
Comment 41•12 years ago
|
||
(In reply to Henri Sivonen (:hsivonen) from comment #35) > It looks like the permission is just "plug-ins" as opposed to "plug-in Foo". > I think plug-ins should be enabled on a per plug-in type basis. It's > relatively rare for a site to use multiple different plug-ins, so the case > where a user wants to enable e.g. both Flash and Java for a site should be > rare. However, if a site has managed to bait me into enabling Flash for the > site in order to watch a video, I don't want Java-based exploit kits that > someone has dropped on the site to activate, too. You should bring this up at the security review.
Comment 42•12 years ago
|
||
(In reply to Henri Sivonen (:hsivonen) from comment #35) > It looks like the permission is just "plug-ins" as opposed to "plug-in Foo". > I think plug-ins should be enabled on a per plug-in type basis. It's > relatively rare for a site to use multiple different plug-ins, so the case > where a user wants to enable e.g. both Flash and Java for a site should be > rare. However, if a site has managed to bait me into enabling Flash for the > site in order to watch a video, I don't want Java-based exploit kits that > someone has dropped on the site to activate, too. I think this is a must have for this feature in terms of security - I updated the use cases at https://wiki.mozilla.org/Opt-in_activation_for_plugins to make this behavior explicit.
Comment 43•12 years ago
|
||
(In reply to Henri Sivonen (:hsivonen) from comment #35) > It looks like the permission is just "plug-ins" as opposed to "plug-in Foo". Correct. This is essentially a lightweight followup to the initial CTP landing, creating a basic set of permissions to make testing less of a headache. It's not the last word on CTP permissions, and future work will be needed to figure out what the right permissions granularity is -- both in terms of UX and Security.
Summary: implement click to play permission model → implement basic click to play permission model
Assignee | ||
Comment 44•12 years ago
|
||
Comment on attachment 614951 [details] [diff] [review] Patch for bug v4 This and the other patches for this bug are for click-to-play plugins on desktop Firefox. The part 2 patches include platform changes that fix a couple issues with our detection of activated plugins and also auto-enables plugins on the platform side if the permissions are set to "always allow" plugins on the site. I tested these patches (and the patch for bug 742619) with Fennec Native and didn't find any issues. Pushed to tryserver: https://tbpl.mozilla.org/?tree=Try&rev=c9990f15d47e
Attachment #614951 -
Flags: approval-mozilla-central?
Updated•12 years ago
|
Attachment #614951 -
Flags: approval-mozilla-central? → approval-mozilla-central+
Assignee | ||
Comment 45•12 years ago
|
||
sec-review was moved to bug 738698 and is being handled in bug 744534. https://hg.mozilla.org/integration/mozilla-inbound/rev/cd89cb4e2208 https://hg.mozilla.org/integration/mozilla-inbound/rev/cd390cfb7b39 https://hg.mozilla.org/integration/mozilla-inbound/rev/cfadc6e0d700
Assignee | ||
Updated•12 years ago
|
Flags: in-testsuite+
Comment 46•12 years ago
|
||
https://hg.mozilla.org/mozilla-central/rev/cd89cb4e2208 https://hg.mozilla.org/mozilla-central/rev/cd390cfb7b39 https://hg.mozilla.org/mozilla-central/rev/cfadc6e0d700
Status: ASSIGNED → RESOLVED
Closed: 12 years ago
Resolution: --- → FIXED
Comment 47•12 years ago
|
||
How can I reset the white/black list for the "always/never activate plugins for this site" option ?
Assignee | ||
Comment 48•12 years ago
|
||
(In reply to Paul Silaghi [QA] from comment #47) > How can I reset the white/black list for the "always/never activate plugins > for this site" option ? Please see the paragraph about managing your permissions here: http://msujaws.wordpress.com/2012/04/20/site-specific-permissions-for-firefox-opt-in-plugins/
Comment 49•12 years ago
|
||
I've tested this new feature in FF 14 (on Kubuntu 12.04), and it works very well. Congratulations! It's also compatible with Noscript: Even if a site is whitelisted in Noscript (with its default settings), plugins are blocked by CTP. That's how it should be - great! However, there is one problem: CTP (or executing plugins in general) does not work if javascript is not allowed for that website. I realize that most FF users simply use the default settings where javascript is allowed by default. Nevertheless, Noscript is a very popular add-on (and there are some others to control active content). If users of those add-ons stumble upon websites that contain plugins but JS is blocked, CTP simply doesn't work - the CTP placeholders aren't even displayed. That's why I suggest the following enhancement: If JS is blocked on a website that contains plugins and 1. the user clicks the CTP placeholder: allow JS temporarily (this requires that displaying the placeholder is technically possible even if JS is blocked); 2. the user selects "Always activate plugins for this site": Display a hint "Please allow javascript for this site" (or something similar). Implementing such an enhancement would improve the acceptance of CTP as it would sail around some trouble for users of above mentioned add-ons.
Comment 50•12 years ago
|
||
I filed bug 752515 on the issue of JS being disabled. It's better to have separate bug reports on things like that or they won't be tracked.
Comment 51•11 years ago
|
||
Comment on attachment 612767 [details] [diff] [review] Tests for patch v2 >+ Services.perms.removeAll(); You got lucky here that none of the rest of your tests needs any of the predefined permissions installed by the test harness...
Updated•2 years ago
|
Product: Core → Core Graveyard
You need to log in
before you can comment on or make changes to this bug.
Description
•