Thanks. That sounds like a "no" for supporting my two use cases, unless the
customer adds a trusted location or opens the SWF in the standalone player.

On Tue, May 25, 2010 at 12:45 PM, Oleg Sivokon <[email protected]>wrote:

>
>
> OK, it's like this:
> SWF launched in standalone player can interact with the system AND load
> remote content, just like the browser can do the same thing.
> SWF launched in browser plugin can only access permitted folders on your
> hard disc. To allow access to the folder you should either use the web
> interface (see my previous link), or read from the link Ami posted and try
> to figure out how to do that on Mac (you are not required to use web
> interface to establish local trust relationships between SWF and specific
> locations in file system, it's just that, I simply don't know how to do that
> on Mac...)
> There's yet another option for launching a SWF - that's how I usually do
> that - from the local HTTP server, in such case it acts more like as if it
> was deployed to the actual server and all the following rules apply. I would
> definitely recommend the later way of debugging as it is the most similar to
> the live situation.
> The loading of content other than SWF into another SWF is governed by
> policy files aka crossdomain.xml. You need these files if you are loading
> content from domains other than SWF origin.
> The loading of other SWFs by SWF is governed by two things:
> ApplicationDomain provided to the Loader when loading SWF with
> LoaderContext - by default it won't allow crosscripting.
> Security.allowDomain() doesn't define how classes are loaded into
> application domain, however, should prevent security errors related to
> crosscripting.
>
> Well, yes, it is complicated...
>  
>

Reply via email to