Re: IndexedDB: undefined parameters

2012-10-12 Thread Jonas Sicking
On Oct 11, 2012 5:51 PM, Boris Zbarsky bzbar...@mit.edu wrote:

 On 10/11/12 8:43 PM, Jonas Sicking wrote:

 Even for an API like:

 void bar(optional int x);
 void bar(MyInterface? x);

 with or without the treat undefined as not-passed rule, it's
 definitely not obvious which one

 bar(undefined);

 would call. I think the WebIDL spec unambiguously makes it match the
 second one, but I wouldn't call that obvious to authors.


 It's the second one as written.  If the int arg there were
[TreatUndefinedAs=Missing], then the first overload would be chosen, as
WebIDL is written today.  And if we made undefined default to missing, it
would presumably be the first one in this example.

I think that whatever we choose to do here, patterns like the ones in your
or my example aren't going to be obvious to web authors.

Which is why I think we should discourage them in prose or in rules in
WebIDL.

 In general, WebIDL is ultimately a spec aimed at spec authors, not at
 developers. We have to make spec authors assume some level of
 responsibility for the APIs that they create.


 I'm not that sanguine about it so far, but maybe that's because most spec
authors so far don't really understand WebIDL very well...

I somewhat agree, but I don't think that anything we do here is going to
have a big effect on what spec authors do.

 If so, all we're really saying is that overload resolution will drop
 _trailing_ undefined from the argc before determining the overload to
use,
 right?


 If we go with option B above, then doing that sounds good yes.


 I can live with that.

For what it's worth, I'm fine with either function getting selected from
your original example.

/ Jonas


[Bug 15994] origin attribute

2012-10-12 Thread bugzilla
https://www.w3.org/Bugs/Public/show_bug.cgi?id=15994

Ian 'Hixie' Hickson i...@hixie.ch changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 CC||i...@hixie.ch
 Resolution|--- |DUPLICATE

--- Comment #4 from Ian 'Hixie' Hickson i...@hixie.ch ---


*** This bug has been marked as a duplicate of bug 17823 ***

-- 
You are receiving this mail because:
You are on the CC list for the bug.


full screen api

2012-10-12 Thread Carr, Wayne
There’s a recent post on a phishing attack using the full screen api [1][2}[3].

Running the example attack, Firefox and Chrome both put up a popup at the top 
saying the site has gone full screen and asking to approve or deny.  But for 
both of them the screen is already full screen and active (Firefox greys the 
content but doesn’t disable it).  So if the user doesn’t see the popup or 
ignores it, they can think they’re interacting with another site.  In the 
example, it is a bank.

Why not require in the spec that it doesn’t go full screen until after the user 
approves?  That would at least force the user to pay attention to the popup.  A 
note in the warning to users that full screen apps can  mimic other sites may 
be useful.

The draft now says “User agents should ensure, e.g. by means of an overlay, 
that the end user is aware something is displayed fullscreen.”.

That “should” should be “MUST” and it should say no switch can happen to full 
screen until after the user has approved.

The draft also says “This specification was published by the 
WHATCGhttp://www.w3.org/community/whatwg/. It is not a W3C Standard nor is it 
on the W3C Standards Track”  which is a bit confusing for a draft I got off the 
WebApps WG page, is a deliverable in the WebApps charter and which has been 
published as a FPWD by the WG.

[1] http://feross.org/html5-fullscreen-api-attack/
[2] 
http://threatpost.com/en_us/blogs/proof-concept-exploits-html5-fullscreen-api-social-engineering-100912
[3] http://dvcs.w3.org/hg/fullscreen/raw-file/tip/Overview.html



Re: full screen api

2012-10-12 Thread Florian Bösch
There was a limited discussion on that a few days ago with the limited
consensus (?) being that requiring user-consent up front before switching
to fullscreen is desired, should be in the standard and isn't sacrificing
UX.

On Fri, Oct 12, 2012 at 8:20 PM, Carr, Wayne wayne.c...@intel.com wrote:

  There’s a recent post on a phishing attack using the full screen api
 [1][2}[3].

 Running the example attack, Firefox and Chrome both put up a popup at the
 top saying the site has gone full screen and asking to approve or deny.
 But for both of them the screen is already full screen and active (Firefox
 greys the content but doesn’t disable it).  So if the user doesn’t see the
 popup or ignores it, they can think they’re interacting with another site.
 In the example, it is a bank.

 Why not require in the spec that it doesn’t go full screen until after the
 user approves?  That would at least force the user to pay attention to the
 popup.  A note in the warning to users that full screen apps can  mimic
 other sites may be useful.

 The draft now says “User agents should ensure, e.g. by means of an
 overlay, that the end user is aware something is displayed fullscreen.”.

 That “should” should be “MUST” and it should say no switch can happen to
 full screen until after the user has approved.

 The draft also says “This specification was published by the 
 *WHATCG*http://www.w3.org/community/whatwg/.
 It is not a W3C Standard nor is it on the W3C Standards Track”  which is a
 bit confusing for a draft I got off the WebApps WG page, is a deliverable
 in the WebApps charter and which has been published as a FPWD by the WG.

 [1] 
 *http://feross.org/html5-fullscreen-api-attack/*http://feross.org/html5-fullscreen-api-attack/
 [2] *
 http://threatpost.com/en_us/blogs/proof-concept-exploits-html5-fullscreen-api-social-engineering-100912
 *http://threatpost.com/en_us/blogs/proof-concept-exploits-html5-fullscreen-api-social-engineering-100912
 [3] 
 *http://dvcs.w3.org/hg/fullscreen/raw-file/tip/Overview.html*http://dvcs.w3.org/hg/fullscreen/raw-file/tip/Overview.html