There are several options: 1. capture file:// and ignore it in the short-term, add confinement and content-hub later 2. add confinement and content-hub now 3. add content-hub now and confinement later 4. add confinement now and content-hub later 5. do nothing
'5' is probably out of the question at this point, since it is the status quo and it is clear no one is happy with it. :) '1' is an option as a band-aid, but it requires development work. It isn't clear to me that capturing file contributes to using content-hub later. This is possibly a short term fix. '2' fixes everything all at once. This would require talking work away from other areas and needs design input. This is a medium term fix. '3' is similar to '1', but makes sure we are in alignment for future engineering work. This is a medium term fix. '4' has a similar affect to '1' in that it breaks file:// access, but also covers any other access. It can be a short term fix and aligns with future engineering work. I believe '4' (this is bug #1356516) is the path forward in the short term. It addresses the security and privacy concerns and aligns with future engineering work. For convergence, content-hub integration will be a requirement. I'll discuss this with the oxide team and report back. -- You received this bug notification because you are a member of Ubuntu Touch seeded packages, which is subscribed to webbrowser-app in Ubuntu. https://bugs.launchpad.net/bugs/1393515 Title: browser allows browsing the phone filesystem Status in Canonical System Image: Confirmed Status in webbrowser-app package in Ubuntu: Confirmed Status in webbrowser-app package in Ubuntu RTM: Confirmed Bug description: Using a URL like: file:/// gets you to the root of the phone filesystem ... i assume this is not actually desired since we even block the filemanager app to go higher up then $HOME without requiring a password. The webbrowser-app should either: * behave like the file-manager (see bug #1347010 for details) * file:/// should be disabled altogether on the phone * webbrowser-app should run confined which would force the use of content-hub by limiting file:/// access to those paths allowed by policy To manage notifications about this bug go to: https://bugs.launchpad.net/canonical-devices-system-image/+bug/1393515/+subscriptions -- Mailing list: https://launchpad.net/~touch-packages Post to : touch-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~touch-packages More help : https://help.launchpad.net/ListHelp