Follow-up r64670 (bug22929): cleaner implementation of security for script (and poten...
authorHappy-melon <happy-melon@users.mediawiki.org>
Fri, 4 Feb 2011 16:39:17 +0000 (16:39 +0000)
committerHappy-melon <happy-melon@users.mediawiki.org>
Fri, 4 Feb 2011 16:39:17 +0000 (16:39 +0000)
commitda36f65433d3c826221d45d8d46253bb6e24e0b4
tree1cf9a4a5181a8883c3566967aeb7334d76fe8231
parent47529179e946abdb4b01aa92490f5f1c11c619e4
Follow-up r64670 (bug22929): cleaner implementation of security for script (and potentially CSS) files.  ResourceLoader *already* knows where each module has come from, so all we need to do is filter them in OutputPage according to the desired level of 'trustworthiness'.

TODO:
* Are there instances where we might want to restrict CSS as well as JS?
* Would a $wg config option and/or user preference and/or index.php GET parameter to limit inclusion be useful?
* Can we deprecate any of the existing $wg config options?
* What's going on with the duplicated code between OutputPage and SkinTemplate?
includes/OutputPage.php
includes/SkinTemplate.php
includes/resourceloader/ResourceLoaderModule.php
includes/resourceloader/ResourceLoaderUserModule.php
includes/resourceloader/ResourceLoaderUserOptionsModule.php
includes/resourceloader/ResourceLoaderWikiModule.php