New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 785501 link

Starred by 5 users

Issue metadata

Status: Fixed
Owner:
Last visit > 30 days ago
Closed: Dec 6
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 2
Type: Bug



Sign in to add a comment

Support for WebAssembly in Chrome Apps (via CSP)

Project Member Reported by bradnelson@chromium.org, Nov 15 2017

Issue description

Chrome Apps provide a fixed CSP policy.
WebAssembly currently is only under the unsafe-eval directive (or the absence of a policy).

tsepez and other have agreed to the notion that we can allow WebAssembly for all chrome apps. There are now Chrome Apps eager to migrate off Native Client (which is allowed) to Wasm (which is not), that are blocked on this.

We should add a mechanism to whitelist Wasm for Chrome Apps. We have a early CG proposals around CSP that might end with a wasm-eval directive. We could implement this for chrome apps only and add to the canned chrome apps policy, or we might do something more direct.

 
Cc: mitchfoley@chromium.org mkwst@chromium.org

Comment 2 by palmer@chromium.org, Nov 15 2017

Components: Platform>Extensions Platform>Apps
Labels: OS-Chrome OS-Linux OS-Mac OS-Windows
Do we mean extensions, or apps? (Aren't apps going away?)

Could it be an extension permission instead of a whitelist?

Comment 3 by eholk@chromium.org, Nov 15 2017

Apps are still used for ChromeOS, which is the main reason we need this. My understanding is that extensions are allowed to set their own CSP, so they can get Wasm via 'unsafe-eval'. Apps are restricted to a fixed CSP that does not include 'unsafe-eval'.

Comment 4 by palmer@chromium.org, Nov 15 2017

Components: -Platform>Extensions
Labels: -OS-Linux -OS-Windows -OS-Mac
I see, thanks!
Was this fixed by crrev.com/520311 ?
Yes.
Status: Fixed (was: Assigned)

Sign in to add a comment