-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Should access to sandboxed file system be secure context only? #58
Comments
+1 to SecureContext only. (Having the legacy API exposed in non-secure origins is something Chrome already has for quota APIs) |
+1 Long-term, all client-side storage features should be restricted to secure origins. |
Is |
Excellent question, but probably a better question for https://github.com/w3c/webappsec-secure-contexts/issues. A context being a secure context is more than just the origin being secure, but anyway, according to https://w3c.github.io/webappsec-secure-contexts/#is-origin-trustworthy it does appear that However that isn't the entire story, the first step in the algorithm checks if an origin is opaque, and https://url.spec.whatwg.org/#origin kind of leaves it up in the air if Either way even without the secure contexts spec apparently treating all opaque origins as insecure, I don't think we would want to make sandboxed file system available in opaque origins anyway, similar to how most other storage mechanisms aren't available in opaque origins either. |
@mkruisselbrink From the point-of-view of "trust nothing" and verify everything, Aside from the semantics and specification author indecision as to whether Am banned from WHATWG (evidently indefinitely) ostensibly for asking such questions, therefore cannot presently ask any further questions at WHATWG umbrella documents at GitHub. FWIW, will cast vote that whatever any specification has decided or not decided conclusively as to |
Also add [Exposed=] attributes to all interfaces, as required by WebIDL. Fixes #58
As currently written, only access to the native file system (via chooseFileSystemEntries) requires a secure context, while access to the sandboxed file system can be done by insecure origins as well (after all, that's what the chrome-only existing sandboxed file system API also does).
But probably we want to just make the entire API secure context only?
The text was updated successfully, but these errors were encountered: