<?xml version="1.0" encoding="UTF-8" standalone="yes" ?>
<!DOCTYPE bugzilla SYSTEM "https://bugs.webkit.org/page.cgi?id=bugzilla.dtd">

<bugzilla version="5.0.4.1"
          urlbase="https://bugs.webkit.org/"
          
          maintainer="admin@webkit.org"
>

    <bug>
          <bug_id>189963</bug_id>
          
          <creation_ts>2018-09-25 11:40:07 -0700</creation_ts>
          <short_desc>[WPE][GTK] Fix file:// URI access in sandbox</short_desc>
          <delta_ts>2018-10-15 08:08:45 -0700</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>1</classification_id>
          <classification>Unclassified</classification>
          <product>WebKit</product>
          <component>WebKitGTK</component>
          <version>WebKit Nightly Build</version>
          <rep_platform>Unspecified</rep_platform>
          <op_sys>Unspecified</op_sys>
          <bug_status>RESOLVED</bug_status>
          <resolution>INVALID</resolution>
          
          
          <bug_file_loc></bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords></keywords>
          <priority>P2</priority>
          <bug_severity>Normal</bug_severity>
          <target_milestone>---</target_milestone>
          
          <blocked>189956</blocked>
          <everconfirmed>1</everconfirmed>
          <reporter name="Patrick Griffis">pgriffis</reporter>
          <assigned_to name="Nobody">webkit-unassigned</assigned_to>
          <cc>bugs-noreply</cc>
          

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>1463246</commentid>
    <comment_count>0</comment_count>
    <who name="Patrick Griffis">pgriffis</who>
    <bug_when>2018-09-25 11:40:07 -0700</bug_when>
    <thetext>Currently `file://` URIs are all handled by the NetworkProcess which does not have filesystem access.

Granting that access would defeat the purpose of the sandbox so this needs to be moved out of this process.

One idea would be creating a new LocalFileProcess or such so it could work but doesn&apos;t compromise every
websites NetworkProcess.

This cannot be solved by simply mounting requested URIs dynamically at runtime as all `bwrap` permissions
happen once at process creation and adding bind mounts later would require root permissions which is
not ideal.

We also cannot use the `document-portal` that flatpak uses because it does not handle
directories yet and doesn&apos;t have any solid plans how to do so.</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>1469215</commentid>
    <comment_count>1</comment_count>
    <who name="Patrick Griffis">pgriffis</who>
    <bug_when>2018-10-15 08:08:45 -0700</bug_when>
    <thetext>We&apos;ve decided to trust the NetworkProcess for now and not sandbox it so this no longer applies.</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>