Re: [XHR] Status Update

2010-08-10 Thread Anne van Kesteren
On Tue, 10 Aug 2010 00:37:58 +0200, Maciej Stachowiak m...@apple.com  
wrote:

On Aug 9, 2010, at 6:05 AM, Anne van Kesteren wrote:
As a result of working on the test suite I found a few minor issues  
that would be nice to resolve (I'm not particularly interested in the  
solution to each of these problems, but I thought I would propose one  
in order to move things forward). I filed these bugs on them:


 http://www.w3.org/Bugs/Public/show_bug.cgi?id=10322


I agree with this change.


 http://www.w3.org/Bugs/Public/show_bug.cgi?id=10323


I'll have to think about this one. It does seem like a feature addition,  
and it's late in the game for that. It's not totally clear to me that  
responseXML is the best way to expose parsing of HTML documents, since  
there is no way to feature test for it. CR is probably too late to be  
adding features, especially when it's not 100% clear it is the right  
design.


Fair enough. I'm generating XMLHttpRequest and XMLHttpRequest Level 2 from  
the same source document and was trying to get rid of some of the (in my  
view) unneeded differences with some of these comments. I'll mark this bug  
as WONTFIX.




 http://www.w3.org/Bugs/Public/show_bug.cgi?id=10324


Agree, assuming there is no Web compatibility issue.


 http://www.w3.org/Bugs/Public/show_bug.cgi?id=10325


Agree.


 http://www.w3.org/Bugs/Public/show_bug.cgi?id=10326


How do implementations currently behave in this case?


It seems most implementations actually allow it (commented in the bug). (I  
have not written tests for authorization yet.) But I believe Internet  
Explorer throws and per RFC 2616 it is not even part of http URLs.




 http://www.w3.org/Bugs/Public/show_bug.cgi?id=10327


I'm not sure what the current proposal is here. I don't think a scheme  
whitelist is right.


The current proposal is described in the last comment. Namely to allow  
everything (nothing is unsupported as far as open() is concerned) and  
let it be a network error in the request layer. (They will be cross-origin  
and not support CORS unless we really want them to work.)




 http://www.w3.org/Bugs/Public/show_bug.cgi?id=10328


Seems ok to me, if there is no compatibility issue.


Not mentioning it at all is probably safest.


Which of the changes above would require us to drop back to Working  
Draft and have another Last Call? Any of them, or just a subset?


The one that changes conformance is not throwing for non same-origin URLs.  
That is also the most important. I do not think we can consider it just a  
bug fix but we could discuss it with the Director and see if it is ok.


Relevant URLs:

http://www.w3.org/Bugs/Public/show_bug.cgi?id=10322
http://www.w3.org/2005/10/Process-20051014/tr.html#substantive-change


If we do have another Last Call, I would prefer to go to CR again and  
not short-circuit the process. I place more value on careful process  
than on getting to REC quickly.


We could only go to PR if we met the CR requirements. Essentially you get  
a zero-day CR. If we actually have met the requirements (of which two  
fully compliant implementations will be the most tricky one) there is not  
much reason to issue a CR. I'm fine with doing it anyway though, but lets  
table this for then :-)



--
Anne van Kesteren
http://annevankesteren.nl/



Re: ACTION-568: Create an alternative mechanism for openURL andsend it to the mail list (Web Applications Working Group)

2010-08-10 Thread Marcos Caceres



On 8/10/10 9:03 AM, gaut...@opera.com wrote:

Quoting SULLIVAN, BRYAN L (ATTCINW) bs3...@att.com:


Marcos,
You're saying if I understand you, that if I create an anchor:

a href=http://mywidget.com;Click to load the online version/a

That when the user clicks this link it will launch the browser,
instead of retrieving the online version of my widget (or at least of
this page of it)? This would in essence prevent the use of anchors
anywhere in widgets, where the developer's intent was to have the web
runtime retrieve and present the content directly, within the widget's
context. For example, if I want to use an iframe to pull in some
external content and then allow the user to navigate the content
within the iframe - in your proposal the first link they hit in the
iframe would take them out of the widget and into the browser. Not the
desired experience IMO.

Or do I misunderstand your proposal?


Hi Bryan, inline content (iframe, img, etc.) inclusion is not affected 
by the proposal. It's perfectly fine to have the following...


Opens in new window:
a href=http://foo.com;foo/a
a href=tel:+12312Call foo/a

Relative link, open in widget context:
a href=bar.htmlbar/a

Embeds in page, if allowed by WARP:
iframe src=http://foo.com;/iframe



I think the proposal is missing explicit meaning for target=_self and
_blank
(something I'm sure Marcos has considered, maybe just not clarified.)

a href=http://www.mywidget.com/;click here/a

If the linked location is inside the widget package, or
sms:/tel:/similar protocols that don't need a browsing context, I would
expect:
- it to load in target=_self (ie. the widget)


Right. This is/would-be defined in HTML5.


If the linked location is outside the widget package, I would expect:
- it to load in target=_blank (ie. the browser)


As above.


If a specific rule must be followed, the developer must add target=_self
or _blank depending on where the resource must be opened, for example.
Loading a widget link from inside a widget, or for initiating a download
- target=_self could be explicitly used.


Marcos, please correct me if I'm reading too much into your proposal.


You are reading it just fine; But your clarifications are outside the 
scope of the Widget Interface spec.



--
Marcos Caceres
Opera Software



Re: [IndexedDB] question about description argument of IDBFactory::open()

2010-08-10 Thread Andrei Popescu
On Mon, Aug 9, 2010 at 11:36 PM, Jeremy Orlow jor...@chromium.org wrote:
 On Mon, Aug 9, 2010 at 11:31 PM, Jonas Sicking jo...@sicking.cc wrote:

 On Mon, Aug 9, 2010 at 3:24 PM, Jeremy Orlow jor...@chromium.org wrote:
  On Mon, Aug 9, 2010 at 11:15 PM, Andrei Popescu andr...@google.com
  wrote:
 
  On Mon, Aug 9, 2010 at 9:57 PM, Jeremy Orlow jor...@chromium.org
  wrote:
   I'm pretty sure opening a database with a different description is
   actually
   already specified: the new one takes precedent.  Take a look at the
   algorithm for database opening; I'm pretty sure it's there.
   When talking to Andrei earlier tonight I thought we'd probably want
   to
   make
   it optional, but now I'm thinking maybe we shouldn't.  You're right,
   Shawn,
   that the description can be useful for many reasons.  And although it
   seems
   redundant for a developer to pass in the description every time, I
   actually
   can't think of any reason why a developer wouldn't want to.
 
  Actually, I think it's pretty inconvenient to have to specify a
  description every time, especially since I am not sure developers
  would want to change the description very often. I think we should
  allow a null string for future connections as Shawn suggested.
 
  How do developers distinguish between when they're opening a database
  for
  the first time or not?  Normally they'd look at the version, but that's
  not
  available until _after_ you've supplied the description (and presumably
  some
  UAs might have asked the user if it's OK or something like that).  If
  the
  spec has a way to enumerate databases (something we've talked about
  doing)
  then it's possible that the developer could decide whether or not to
  pass in
  a version string that way.  But why would they do this?
  So the only possible reason I could see for someone doing this is if
  they
  open a database in several places in one page and they can
  somehow guarantee that one of them happens first.  The first question
  here
  would be but why?.  And the second question is whether we trust users
  to
  for sure know the ordering that things are opened.
  On the other hand, it doesn't seem that hard to supply a description
  every
  time it's opened.  I mean you just define it in one places within your
  script and use that.  Or, better yet, just save the database to a
  variable
  and call open once early on in initialization.  That'll make things less
  async anyway.
  Am I missing something here?

 I have actually been thinking that it's likely fairly common to be
 opening a database in several different locations and know which ones
 should always be reopening an existing database.

 I don't have any data on this though.

 Neither do I.
 Well, if we make it optional based on the assumption this is true, maybe we
 could spec it such that opening a database for the first time with no
 description is an error?
 Or we just remove description all together if it's not going to
 be dependable?

Thinking more about it, do we really want this string to be displayed
to the user? What happens if the browser is using one locale and the
string is in another? To me, the description is something internal to
the application, not something intended for the end-user. I think we
should remove it altogether if we don't have a good use case for it.

Thanks,
Andrei



CfC: to publish new WD of Indexed Database API; deadline August 17

2010-08-10 Thread Arthur Barstow
All - the Editors of the Indexed Database API would like to publish a 
new Working Draft:


  http://dvcs.w3.org/hg/IndexedDB/raw-file/tip/Overview.html

If you have any comments or concerns about this proposal, please send 
them to public-webapps by August 10 at the latest.


As with all of our CfCs, positive response is preferred and encouraged 
and silence will be assumed to be assent.


-Art Barstow




Re: CfC: to publish new WD of Indexed Database API; deadline August 17

2010-08-10 Thread Jeremy Orlow
On Tue, Aug 10, 2010 at 12:04 PM, Arthur Barstow art.bars...@nokia.comwrote:

 All - the Editors of the Indexed Database API would like to publish a new
 Working Draft:

  http://dvcs.w3.org/hg/IndexedDB/raw-file/tip/Overview.html

 If you have any comments or concerns about this proposal, please send them
 to public-webapps by August 10 at the latest.


I assume you mean the 17th?

As with all of our CfCs, positive response is preferred and encouraged and
 silence will be assumed to be assent.


We support.


Re: CfC: to publish new WD of Indexed Database API; deadline August 17

2010-08-10 Thread Arthur Barstow

Yes, the deadline for comments is August 17!

On 8/10/10 7:38 AM, ext Jeremy Orlow wrote:
On Tue, Aug 10, 2010 at 12:04 PM, Arthur Barstow 
art.bars...@nokia.com mailto:art.bars...@nokia.com wrote:


All - the Editors of the Indexed Database API would like to
publish a new Working Draft:

http://dvcs.w3.org/hg/IndexedDB/raw-file/tip/Overview.html

If you have any comments or concerns about this proposal, please
send them to public-webapps by August 10 at the latest.


I assume you mean the 17th?

As with all of our CfCs, positive response is preferred and
encouraged and silence will be assumed to be assent.


We support.




Re: [xhr] RFC2617 Digest authentication

2010-08-10 Thread Anne van Kesteren
On Tue, 27 Jul 2010 16:32:48 +0200, Yrjänä Rankka gh...@openlinksw.com  
wrote:
Please correct me if I'm wrong, but as I read the XHR level 2 draft, it  
seems impossible to do Digest auth with custom mechanism for acquiring  
the authentication credentials. I.e. supplying your own login dialog.


To correctly digest authenticate, one needs to be challenged by the  
server first. To do that one needs to attempt to invoke a method on a  
resource without, or with invalid credentials. The resulting 401  
Unauthorized reply then contains the challenge with nonce, opaque, etc.  
values required to produce correct reply.


In order to inhibit the browser from prompting the credentials from  
user, one must define user, password in call to open() method. My  
observations show this will produce a basic Authenticate: header in the  
request thus leaking the user/password out in the open even though the  
server might refuse Basic auth.


I believe some of the browsers wait to be challenged first, actually. That  
is what should happen per XMLHttpRequest.



Many servers do and should refuse HTTP Basic auth over a non-encrypted  
connection. This is required by WebDAV [1], for example.


Now it may be possible to trick some of the clients into Digest  
authentication without prompting the user by first calling open() with  
bogus user/password - then catching the 401 reply and on subsequent try  
call open() again with correct user/password values, hoping that the  
client cached the challenge. This would qualify as a hack, though, since  
AFAIK this behaviour is not prescribed by the Draft.


I have no problem with rolling my own Digest authentication routines in  
the client but this would require a clean flag in the XHR to disable any  
attempt to do authentication on its behalf. Then again, another flag  
forcing the XHR to only authenticate when challenged, and then choose  
the strongest available method, as required by rfc2617 [2] would be  
preferable and would make it easier for developers to use a standard  
authentication method, reusing what's already implemented in most  
(modern) clients.


We might add such a flag and a flag to control redirects in the future,  
but not for now.




[1] http://www.webdav.org/specs/rfc4918.html#rfc.section.20.1
[2] http://tools.ietf.org/html/rfc2617#section-4.6



--
Anne van Kesteren
http://annevankesteren.nl/



Re: CfC: to publish new WD of Indexed Database API; deadline August 17

2010-08-10 Thread Kris Zyp
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
 
Any chance #10304 could be resolved prior to the publishing? Seems
like it would be nice to get a change to the core store API sooner
rather than later. Either way, I am +1 for publishing though.
Thanks,
Kris

On 8/10/2010 5:04 AM, Arthur Barstow wrote:
 All - the Editors of the Indexed Database API would like to publish
 a new Working Draft:

   http://dvcs.w3.org/hg/IndexedDB/raw-file/tip/Overview.html

 If you have any comments or concerns about this proposal, please
 send them to public-webapps by August 10 at the latest.

 As with all of our CfCs, positive response is preferred and
 encouraged and silence will be assumed to be assent.

 -Art Barstow



- -- 
Kris Zyp
SitePen
(503) 806-1841
http://sitepen.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.9 (MingW32)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/
 
iEYEARECAAYFAkxhVu4ACgkQ9VpNnHc4zAyHygCfU1nLMK8WLnG1FETtaOtbpLDn
nxgAnAxoTdIwTx22NCJPrE5l9jeC4PJS
=8p1i
-END PGP SIGNATURE-




Re: [XHR] Status Update

2010-08-10 Thread Julian Reschke

On 09.08.2010 22:25, Anne van Kesteren wrote:

On Mon, 09 Aug 2010 20:54:48 +0200, Jonas Sicking jo...@sicking.cc wrote:

Some of these bugs are feature enhancements. Such as adding support
for sending and receiving text/html documents. In the interest of
getting us to rec as quickly as possible I suggest that these features
are added to XHR L2 instead.


Actually, by virtue of following the Document.innerHTML algorithm from
HTML5 sending HTML documents is already covered for in XMLHttpRequest.
It is just that the media type (as the bug indicates) is always set to
application/xml rather than text/html for HTML documents.

Receiving HTML documents would indeed be a newish feature, except that
you already need to follow HTML5 rules to discover the character
encoding for responseText, etc. so adding this did not seem like a big
burden on implementations on top of which it makes sense that if you can
send them (which was already possible) you can also receive them.
...


I sure hope nobody follows HTML5 for the encoding detection :-). See 
http://www.w3.org/Bugs/Public/show_bug.cgi?id=9628, raised over three 
months ago.


Best regards, Julian



Re: CfC: to publish new WD of Indexed Database API; deadline August 17

2010-08-10 Thread Jonas Sicking
I support this.

On Tue, Aug 10, 2010 at 4:38 AM, Jeremy Orlow jor...@google.com wrote:
 On Tue, Aug 10, 2010 at 12:04 PM, Arthur Barstow art.bars...@nokia.com
 wrote:

 All - the Editors of the Indexed Database API would like to publish a new
 Working Draft:

  http://dvcs.w3.org/hg/IndexedDB/raw-file/tip/Overview.html

 If you have any comments or concerns about this proposal, please send them
 to public-webapps by August 10 at the latest.

 I assume you mean the 17th?

 As with all of our CfCs, positive response is preferred and encouraged and
 silence will be assumed to be assent.

 We support.



Re: [xhr] RFC2617 Digest authentication

2010-08-10 Thread Yrjänä Rankka

 On 8/10/10 15:34 , Anne van Kesteren wrote:
On Tue, 27 Jul 2010 16:32:48 +0200, Yrjänä Rankka 
gh...@openlinksw.com wrote:
Please correct me if I'm wrong, but as I read the XHR level 2 draft, 
it seems impossible to do Digest auth with custom mechanism for 
acquiring the authentication credentials. I.e. supplying your own 
login dialog.


To correctly digest authenticate, one needs to be challenged by the 
server first. To do that one needs to attempt to invoke a method on a 
resource without, or with invalid credentials. The resulting 401 
Unauthorized reply then contains the challenge with nonce, opaque, 
etc. values required to produce correct reply.


In order to inhibit the browser from prompting the credentials from 
user, one must define user, password in call to open() method. My 
observations show this will produce a basic Authenticate: header in 
the request thus leaking the user/password out in the open even 
though the server might refuse Basic auth.


I believe some of the browsers wait to be challenged first, actually. 
That is what should happen per XMLHttpRequest.



Yep. Most seem to do this after all. I think what I was seeing was 
caused by the realm in question having previously presented a basic 
authenticate challenge only, and the browsers in question caching that info.


Many servers do and should refuse HTTP Basic auth over a 
non-encrypted connection. This is required by WebDAV [1], for example.


Now it may be possible to trick some of the clients into Digest 
authentication without prompting the user by first calling open() 
with bogus user/password - then catching the 401 reply and on 
subsequent try call open() again with correct user/password values, 
hoping that the client cached the challenge. This would qualify as a 
hack, though, since AFAIK this behaviour is not prescribed by the Draft.


I have no problem with rolling my own Digest authentication routines 
in the client but this would require a clean flag in the XHR to 
disable any attempt to do authentication on its behalf. Then again, 
another flag forcing the XHR to only authenticate when challenged, 
and then choose the strongest available method, as required by 
rfc2617 [2] would be preferable and would make it easier for 
developers to use a standard authentication method, reusing what's 
already implemented in most (modern) clients.


We might add such a flag and a flag to control redirects in the 
future, but not for now.


Was worth a try anyway. For sure people shouldn't try and roll their own 
(often snake-oil -based) auth lightly. Would be great to be able to 
direct client to refuse BASIC auth over non-TLS wire altogether, though.


Yrjänä



[1] http://www.webdav.org/specs/rfc4918.html#rfc.section.20.1
[2] http://tools.ietf.org/html/rfc2617#section-4.6






--
Yrjana Rankka| gh...@openlinksw.com
Developer, Virtuoso Team | http://www.openlinksw.com
 | Making Technology Work For You




RE: ACTION-568: Create an alternative mechanism for openURL andsend it to the mail list (Web Applications Working Group)

2010-08-10 Thread SULLIVAN, BRYAN L (ATTCINW)
If the linked location is outside the widget package, it should not 
automatically load in the browser. We need the ability of widgets to download 
and present network-based content through means other than XHR or iframes. If 
my widget is designed to ingest and present content from external sources 
(declared as per WARP) within its context (and not just within an iframe), 
causing such external references to launch in the browser will prevent the 
intended operation of the widget.

Thanks, 
Bryan Sullivan | ATT


-Original Message-
From: Marcos Caceres [mailto:marc...@opera.com] 
Sent: Tuesday, August 10, 2010 12:30 AM
To: gaut...@opera.com; SULLIVAN, BRYAN L (ATTCINW)
Cc: Web Applications Working Group WG
Subject: Re: ACTION-568: Create an alternative mechanism for openURL andsend it 
to the mail list (Web Applications Working Group)



On 8/10/10 9:03 AM, gaut...@opera.com wrote:
 Quoting SULLIVAN, BRYAN L (ATTCINW) bs3...@att.com:

 Marcos,
 You're saying if I understand you, that if I create an anchor:

 a href=http://mywidget.com;Click to load the online version/a

 That when the user clicks this link it will launch the browser,
 instead of retrieving the online version of my widget (or at least of
 this page of it)? This would in essence prevent the use of anchors
 anywhere in widgets, where the developer's intent was to have the web
 runtime retrieve and present the content directly, within the widget's
 context. For example, if I want to use an iframe to pull in some
 external content and then allow the user to navigate the content
 within the iframe - in your proposal the first link they hit in the
 iframe would take them out of the widget and into the browser. Not the
 desired experience IMO.

 Or do I misunderstand your proposal?

Hi Bryan, inline content (iframe, img, etc.) inclusion is not affected 
by the proposal. It's perfectly fine to have the following...

Opens in new window:
a href=http://foo.com;foo/a
a href=tel:+12312Call foo/a

Relative link, open in widget context:
a href=bar.htmlbar/a

Embeds in page, if allowed by WARP:
iframe src=http://foo.com;/iframe


 I think the proposal is missing explicit meaning for target=_self and
 _blank
 (something I'm sure Marcos has considered, maybe just not clarified.)

 a href=http://www.mywidget.com/;click here/a

 If the linked location is inside the widget package, or
 sms:/tel:/similar protocols that don't need a browsing context, I would
 expect:
 - it to load in target=_self (ie. the widget)

Right. This is/would-be defined in HTML5.

 If the linked location is outside the widget package, I would expect:
 - it to load in target=_blank (ie. the browser)

As above.

 If a specific rule must be followed, the developer must add target=_self
 or _blank depending on where the resource must be opened, for example.
 Loading a widget link from inside a widget, or for initiating a download
 - target=_self could be explicitly used.


 Marcos, please correct me if I'm reading too much into your proposal.

You are reading it just fine; But your clarifications are outside the 
scope of the Widget Interface spec.


-- 
Marcos Caceres
Opera Software


RE: ACTION-568: Create an alternative mechanism for openURL andsend it to the mail list (Web Applications Working Group)

2010-08-10 Thread marcosc

Quoting SULLIVAN, BRYAN L (ATTCINW) bs3...@att.com:

If the linked location is outside the widget package, it should   
not automatically load in the browser.


I don't understand what you mean here?

We need the ability of  widgets to download and present  
network-based content through means  other than XHR or iframes.


What does this have to do with openURL? What do you need openURL to do  
that window.open can't do? or that a href= can't do?


If my widget is designed to ingest and  present content from  
external sources (declared as per WARP) within  its context (and not  
just within an iframe), causing such external  references to launch  
in the browser will prevent the intended  operation of the widget.


The proposal has no inpact on XHR. What does this have to do with openURL?





[Bug 10211] Remove the no host-specific component requirement for targetOrigin, see implementor discussion in http://lists.whatwg.org/htdig.cgi/whatwg-whatwg.org/2010-July/027136.html and subsequ

2010-08-10 Thread bugzilla
http://www.w3.org/Bugs/Public/show_bug.cgi?id=10211


Ian 'Hixie' Hickson i...@hixie.ch changed:

   What|Removed |Added

 Status|NEW |RESOLVED
 CC||i...@hixie.ch
 Resolution||FIXED




--- Comment #2 from Ian 'Hixie' Hickson i...@hixie.ch  2010-08-11 01:11:15 ---
EDITOR'S RESPONSE: This is an Editor's Response to your comment. If you are
satisfied with this response, please change the state of this bug to CLOSED. If
you have additional information and would like the editor to reconsider, please
reopen this bug. If you would like to escalate the issue to the full HTML
Working Group, please add the TrackerRequest keyword to this bug, and suggest
title and text for the tracker issue; or you may create a tracker issue
yourself, if you are able to do so. For more details, see this document:
   http://dev.w3.org/html5/decision-policy/decision-policy.html

Status: Accepted
Change Description: see diff given below
Rationale: Concurred with reporter's comments.

-- 
Configure bugmail: http://www.w3.org/Bugs/Public/userprefs.cgi?tab=email
--- You are receiving this mail because: ---
You are on the CC list for the bug.