Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Realms Initialization Control #985

Open
1 task done
weizman opened this issue Aug 28, 2024 · 4 comments
Open
1 task done

Realms Initialization Control #985

weizman opened this issue Aug 28, 2024 · 4 comments

Comments

@weizman
Copy link

weizman commented Aug 28, 2024

こんにちは TAG-さん!

I'm requesting a TAG review of Realms Initialization Control.

Initialization of same origin realms in an application should be under that application's control.

This proposal describes an opt-in capability to set a script to be loaded first, every time a same origin realm with synchronous access to the main execution environment of the application is created.

The location of the script can be relative or absolute. Secure connection is required. The proposed method for setting the script is a Content Security Policy directive as follows: Content-Security-Policy: "realm-init: /scripts/on-new-same-origin-realm.js" so that the on-new-same-origin-realm.js script will execute before any other JavaScript code executes in the top realm execution environment, as well as any other child realm that matches its origin.

Further details:

  • I have reviewed the TAG's Web Platform Design Principles
  • The group where the incubation/design work on this is being done (or is intended to be done in the future): WICG
  • Existing major pieces of multi-implementer review or discussion of this design: None atm
  • Major unresolved issues with or opposition to this design: None atm
  • This work is being funded by: ConsenSys
@jyasskin
Copy link
Contributor

Are you planning to, or have you talked to WebAppSec and TC39 about this feature?

@weizman
Copy link
Author

weizman commented Aug 29, 2024

Sure did, the community was rather interested in solving this issue as well as in the manner suggested:

(edit: as well as accepted to the WICG of course)

@weizman
Copy link
Author

weizman commented Sep 12, 2024

Is there any other information I can provide to assist you @jyasskin?

@jyasskin
Copy link
Contributor

Sorry for dropping this. Secure the Web Forward isn't either of WebAppSec or TC39. Do you need introductions into those communities? I'm inclined to think that this is reasonable, but those communities have the deep expertise to notice risks or smoother ways to do this.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants