standards-positions icon indicating copy to clipboard operation
standards-positions copied to clipboard

File System Access API (Local Filesystem)

Open BenjaminAster opened this issue 2 years ago • 2 comments

Request for position on an emerging web specification

Information about the spec

  • Spec Title: File System Access
  • Spec URL: https://wicg.github.io/file-system-access/
  • GitHub repository: https://github.com/WICG/file-system-access
  • Issue Tracker (if not the repository's issue tracker):
  • Explainer (if not README.md in the repository): https://github.com/WICG/file-system-access/blob/main/EXPLAINER.md

Design reviews and vendor positions

  • TAG Design Review:
  • Mozilla standards-positions issue: https://github.com/mozilla/standards-positions/issues/154

Bugs tracking this feature

  • WebKit Bugzilla: https://bugs.webkit.org/show_bug.cgi?id=231706
  • Radar: <rdar://problem/84484202>

Anything else we need to know

The File System Access API allows websites to directly interact with the computer's local files. Shipped in Chromium 86.

Note: I'm not talking about the Origin Private File System part of the File System Access API that has already been implemented in WebKit, but about the part that allows for direct access to local files.

BenjaminAster avatar Jul 06 '22 15:07 BenjaminAster

@tomayac Thanks! I've now edited the issue to include these links.

BenjaminAster avatar Jul 06 '22 15:07 BenjaminAster

See also https://github.com/WICG/file-system-access/issues/342 for where the parts of the WICG report got migrated into the WHATWG Storage Workstream, and https://github.com/WICG/file-system-access/issues/370 about removing the duplicated content from the WICG report.

cc @johnwilander @youennf

gsnedders avatar Jul 06 '22 15:07 gsnedders

Colleagues and I have discussed this and don't see a way to grant write access to the end user's local file system in a way that safeguards the end user's interests. Quite in line with the conclusion Mozilla reached in https://github.com/mozilla/standards-positions/issues/154.

We do think there might be ways that <input type=file>, drag & drop, and https://wicg.github.io/entries-api/ could be integrated better with https://fs.spec.whatwg.org/. Allowing usage of the new APIs for read access makes sense.

Based on that I suggest we label this as "position: oppose" 7 days from now.

annevk avatar Feb 08 '23 17:02 annevk

Closing as we've identified our position.

hober avatar Mar 23 '23 19:03 hober

Gee a trillion dollar company taking direction from Mozilla, a defunct “progressive” activist led organization which has a browser that nearly nobody is using? An organization that is propped up by your main competitor? When you don’t even trust them enough to let them run their own browser engine on your phone unless some government forces you to?

Makes total sense.

“We can’t figure out security for sandboxing file access unless you pay us 30%” - shocker!

waynebloss avatar Apr 16 '24 13:04 waynebloss