Add CORS information to webRequest details objects
Categories
(WebExtensions :: Request Handling, enhancement, P5)
Tracking
(Not tracked)
People
(Reporter: synzvato, Unassigned)
References
Details
(Whiteboard: [design-decision-approved][dev-ux])
Updated•7 years ago
|
Comment 4•7 years ago
|
||
Comment 5•7 years ago
|
||
Comment 7•7 years ago
|
||
Updated•6 years ago
|
Comment hidden (advocacy) |
Updated•6 years ago
|
Sorry guys to bother, but is there any plan for resolving this issue?
Waiting now for two years. ;)
Thank you for your work and wish you best
Comment 10•4 years ago
|
||
Decentraleyes is a recommended add-on on the Mozila site, yet it breaks when sites add security features like subresource integrity? It's a bit saddening that we're still catching up with things that would have worked pre-WebExtensions.
Comment 11•4 years ago
|
||
I think the best thing to do is to basically exclude the address moz-extension:// from SOP/CORS, so that something can always be loaded from these extension storage. A bad extension does bad things with and without SOP/CORS.
Comment 12•4 years ago
|
||
(In reply to algo12 from comment #11)
I think the best thing to do is to basically exclude the address moz-extension:// from SOP/CORS, so that something can always be loaded from these extension storage.
Entries in web_accessible_resources
are going to be loadable regardless of CORS settings once my patch for bug 1694679 lands.
Sub-resource integrity is another thing that we may need to revisit, but that's more tricky than CORS. SRI is tracked in bug 1321916, with no recent activity.
Comment 13•4 years ago
|
||
The feature request in bug 1712096 covers the use cases presented thus far.
Updated•2 years ago
|
Comment hidden (advocacy) |
Description
•