Jetpack/Weekly Meeting/2012-12-04
From MozillaWiki
< Jetpack | Weekly Meeting
Contents
Agenda
- SDK
- 1.12 release next week, release status.
- Roundtable
- Websockets Issue in FX 18 ( bug 817669 )
- (Wes) Test failures on central/inbound since last Wednesday. (bug 817670)
- (Wes) Just out of curiosity, where do things stand for supporting per-window private browsing? Sounds like things are just about ready to land to central.
- (Wes) Also, where are we at with the twig repo?
- FOSDEM talks ( etherpad && original announcement )
- Improved stack traces has landed. Keep an eye if you see something strange please report.
- JEP Disposable implementation that should ease unload handling.
- (Erik) Private browsing issue with panels bug 816257
- (Eddy) is going to attempt to document the internals of Jetpack (starting with context-menu.js)
- Jeff - Products administrivia
Awesomeness Schedule
12/4 | Matteo |
12/11 | Wes |
12/18 | Will |
1/8 | Alex |
1/15 | Dave |
1/22 | Eddy |
1/29 | Erik |
2/5 | Gabor |
2/12 | Irakli |
2/19 | Jeff |
Bugs
Triage Followups
No results.
0 Total; 0 Open (0%); 0 Resolved (0%); 0 Verified (0%);
Open Bugs
Attendees
- Matteo
- Jeff
- Dave T
- Dave C
- Gabor
- Wes
- Erik
- Irakli
- Will
- Eddy
- Alex
- Tanvi
Minutes
Builder
Jeff will try to get the 1.12RC pushed to Builder development today, so we can check it works OK.
SDK
- 1.12 release next week
- we need a new RC: 1 cherry-pick needed, https://github.com/mozilla/addon-sdk/commit/2dbe714ce19e7945013ed82ebfd284cab390b4c5
- let's not include stack trace change in the RC
Roundtable
- Websockets Issue in FX 18 ( bug 817669 ): The code works on release and aurora, broken in beta & nightly. This breaks the OnePassword add-on. Gabor's bisecting to try to find the change that broke it. We don't yet know why it's broken and what fixed it in Aurora. We have four weeks until the current Firefox Beta (18) is released. If we have a fix in 2 weeks we have a good chance of getting it uplifted to Beta, on the basis that it breaks an important add-on. It's kind of a hack, what they are doing. Is there a better way to do it, and should we encourage OnePassword people to do that in future? Like, running the web socket in a content script and passing the data back to the main add-on. Regardless, we still have to fix this problem now.
- Test failures on central/inbound since last Wednesday: bug 817670. Seems that a change in JS engine in Firefox caused it. Who can look into it? Gabor's full, Eddy might have time.
- Per-window private browsing: Sounds like things are just about ready to land to central. Are we ready? Erik: there is a problem with panel, that's moved between hidden window and browser window when it's shown. Should we do what Google chrome does, where add-ons by default can't run in private browsing windows?
- Also, where are we at with the twig repo? Not very far. We have a clean twig (temporary branch of moz-central) which we will use to test landing the SDK in Firefox.
- FOSDEM talks ( etherpad && original announcement ): Eddy will go, and propose his Spidermonkey talk. Anyone else?
- Improved stack traces has landed. We have other tracing bugs: bug 731074, for example.
- Tanvi is implementing mixed content blocker. This will block HTTP content that's loaded from HTTPS pages. To do that we need to determine the origin for content scripts that attempt XHR. What do we want to do here? When content scripts are attached to HTTPS pages, they should only be allowed to perform XHR to pages that are also served over HTTPS. But the expanded principal lists all possible origins. We need to know the *actual* origin in this particular case. What if we made the actual origin the first in the list? That would work. Note that add-ons can do cross-domain xhr anyway, just not in content scripts. But this is OK, out of scope for the mixed content blocker.
- JEP Disposable implementation that should ease unload handling.
- Eddy will start documenting Jetpack internals: document lower-level APIs on MDN.