Re: WebRTC connections do not trigger content policies. Should they?

2016-06-21 Thread Eric Rescorla
On Tue, Jun 21, 2016 at 12:30 PM, Daniel Veditz wrote: > On Sat, Jun 18, 2016 at 6:37 AM, Eric Rescorla wrote: > > > instead of having it sourced from the > > ​ ​ > > advertiser's > > ​ ​ > > origin, they instead stand > > up ".publisher.example.com" > > ​ ​

Re: WebRTC connections do not trigger content policies. Should they?

2016-06-21 Thread Daniel Veditz
On Sat, Jun 18, 2016 at 6:37 AM, Eric Rescorla wrote: > instead of having it sourced from the > ​ ​ > advertiser's > ​ ​ > origin, they instead stand > up ".publisher.example.com" > ​ ​ > and > ​ ​ > point > ​ ​ > it at the advertiser's > IP addresses (via an A record to the

Re: ARIA membership and role="password"

2016-06-21 Thread Marco Zehe
An update to this: I just re-joined the ARIA-WG on Mozilla's behalf. Marco 2016-06-02 17:47 GMT+02:00 David Bolter : > Hi Johnathan, > > Our lack of direct W3C ARIA involvement recently is mainly due to > time/resource constraints and we have influence via proxy. > > I

Re: Basic Auth Prevalence (was Re: Intent to ship: Treat cookies set over non-secure HTTP as session cookies)

2016-06-21 Thread Chris H-C
I concur. 1 in every 12 loads require an HTTP auth prompt? Seems very high. Visual inspection of the probe implementations [1] [2] show no obvious faults, so I'm not sure what's going on here. [1]

[Firefox Desktop] Issues found: June 13th to 17th

2016-06-21 Thread Andrei Vaida
Hi everyone, Here's the list of new issues found and filed by the Desktop Release QA Team last week, *June 13 - June 17* (week 24). Additional details on the team's priorities last week, as well as the plans for the current week are available at:

Intent to ship: CSS Mask Image

2016-06-21 Thread 顧思捷
I intend to turn CSS mask image on by default on all platforms. It has been developed behind the MOZ_ENABLE_MASK_AS_SHORTHAND compile flag. Chrome is already shipping this in version 29. Related Bugs: META: https://bugzilla.mozilla.org/show_bug.cgi?id=1224422 Blockers: