Closed
Bug 13619
Opened 25 years ago
Closed 7 years ago
xpconnect needs a proxy scheme to secure the component manager
Categories
(Core :: XPConnect, defect, P3)
Tracking
()
RESOLVED
WONTFIX
Future
People
(Reporter: jband_mozilla, Assigned: dbradley)
References
Details
Shaver made the component manager scriptable and we are now exposing the
component manager via 'Components.manager' (in addition to the newly
available access to the thing via 'getService'.
I plan to build a native proxy around the component manager and reflect that
proxy into JS - never the raw component manager. That way we can still do
component manager specific securty checks even when JS code make direct calls
on the wrapped native object.
Alternately, we could not even bother and force the security manager to filter
*all* method calls to get this level of protection.
Reporter | ||
Updated•25 years ago
|
Status: NEW → ASSIGNED
Blocks: 14520
Updated•25 years ago
|
Summary: xpconnect needs a proxy scheme to secure the component manager → [dogfood]xpconnect needs a proxy scheme to secure the component manager
Whiteboard: [PDT+]
Comment 1•25 years ago
|
||
Added dogfood and PDT+ annotations. Establishing non-crypto security ASAP is
quite vital, as it will likely involve infrastructure manipulation. We want to
avoid any late-term destabilization... so we want this arriving with dogfood
RSN.
Thanks.
Reporter | ||
Updated•25 years ago
|
Summary: [dogfood]xpconnect needs a proxy scheme to secure the component manager → xpconnect needs a proxy scheme to secure the component manager
Whiteboard: [PDT+]
Reporter | ||
Comment 2•25 years ago
|
||
marking this non dogfood because we have no security policies that would both
expose this proxys object AND want to protect access through it.
This proxy object is a way to get calls to go through existing filters. Its
presence or absense will not have any effect on the filter user.
We'll fix this later after doing more important stuff.
Comment 5•24 years ago
|
||
This bug has not been touched for more than nine months. In most cases, that
means it has "slipped through the net". Please could the owner take a moment to
add a comment to the bug with current status, and/or close it.
Thank you :-)
Gerv
Reporter | ||
Comment 6•24 years ago
|
||
mass reassign of xpconnect bugs to dbradley@netscape.com
Assignee: jband → dbradley
Status: ASSIGNED → NEW
Assignee | ||
Updated•24 years ago
|
Status: NEW → ASSIGNED
Target Milestone: --- → Future
Updated•18 years ago
|
QA Contact: pschwartau → xpconnect
Updated•7 years ago
|
Status: ASSIGNED → RESOLVED
Closed: 7 years ago
Resolution: --- → WONTFIX
You need to log in
before you can comment on or make changes to this bug.
Description
•