01:04
<MikeSmith>
jpwhiting: https://gist.github.com/sideshowbarker/6004932
01:06
<MikeSmith>
jpwhiting: not sure if that change to the build file is required or not. It depends on how you have the validator using that schema
01:08
<MikeSmith>
jpwhiting: but I guess you could check by just removing that build-file change temporarily, and if it works without that, you're fine
02:18
<jpwhiting>
MikeSmith: perfect, thanks
10:38
<galant>
why iceweasel shows letters wider then chromium?
10:57
<galant>
I don't udnerstand what is different if I put image that is 16x16 32x32 or 64x64 pixels? are they old shrinked to 16x16? ebacuse I think all favicons that I see have same size?
12:48
<annevk>
http://www.apple.com/logic-pro why link to a 404 from a press release?
15:44
<dglazkov>
good morning, Whatwg!
15:52
<annevk>
morning dglazkov
15:52
<annevk>
dglazkov: in SF this week by any chance?
17:40
<gsnedders>
What's a recommendable JS tutorial nowadays?
17:41
<gsnedders>
(For someone who already knows how to program?)
17:54
<jgraham>
gsnedders: http://api.jquery.com/ ? :p
17:54
<jgraham>
My other, equally useless suggestion is http://www.ecma-international.org/publications/files/ECMA-ST/Ecma-262.pdf
17:57
<jgraham>
Hixie_: I seem to recall that people don't like accessing window.location.href in possibly non-same-origin cases because the exception is always reported in the js console in weblinkit browsers, even if it is caught
18:00
<Hixie_>
ah
18:01
<jgraham>
(actually in my testcase it doesn't even throw if you do that, just returns undefined)
18:02
<jgraham>
(and logs an error)
18:02
<jgraham>
Of course it would be nice if they didn't have this behaviour
18:03
<jgraham>
But I guess you need to convinve abarth it's a bad idea
18:13
<jsbell>
gsnedders: The canonical answer is "JavaScript: The Good Parts" but I haven't personally read it.
18:15
<jsbell>
It's also, by definition, an opinionated view of the language, which may diverge a bit from what real people use. Hence jgraham's first answer.
18:21
<jgraham>
Hint to the people at spotify: there's a reason that I haven't played any Christmas-themed music "for a while now". You might want to consider that in your recommendations page
18:21
jgraham
knows this is a rather ineffective way to communicate with spotify employees
18:33
<abarth>
jgraham: what's a bad idea?
18:38
<jgraham>
abarth: According to webkit-dev you are already convinced :)
18:39
<jgraham>
(not throwing when accessing location.href cross origin)
18:39
<abarth>
hum...
18:40
<abarth>
there's some active discussion about changing this currently
18:40
<abarth>
why don't you want to throw?
18:40
<jgraham>
I do want to throw
18:40
<jgraham>
Sorry, I originally used negatives in a confusing way
18:41
<abarth>
https://code.google.com/p/chromium/issues/detail?id=17325
18:41
<abarth>
ok
18:41
<abarth>
yeah, that's the direction we're heading in
18:41
<abarth>
there's just some trickiness in the implementation that we're working through
18:42
<abarth>
the javascript engine isn't quite prepared for us to throw an exception at that point, but we're fixing it to let us
18:42
<abarth>
then we'll throw the exception and see what the compat impact is
18:43
<jgraham>
Sounds good
18:43
<jgraham>
Hopefully the compat impact it low since Gecko, Presto and, I asssume, IE already throw
22:11
<philandy>
Hi, I'm trying to emulate the xmp tag with outside source.
22:11
<Hixie_>
emulate in what sense?
22:11
<philandy>
meaning not using the xmp tag since the src attribute doesn't work with it.
22:13
<philandy>
would I need to use scripting? I'd love to avoid that if possible.
22:14
<Hixie_>
i don't understand what you mean
22:14
<Hixie_>
what are you trying to do?
22:17
<philandy>
well xmp displays the utf characters within the tags. I was intending to get an external file to display the utf characters there into the xmp tag. Since xmp does not have a src attribute, I have to use something else.
22:18
<philandy>
<html><head /><body><xmp><html></xmp></body></html>
22:19
<philandy>
will display: <html>
22:19
<philandy>
in a browser
22:19
<philandy>
I want to do <xmp src="page.html" />
22:20
<philandy>
since that does not work, I am here to see if anyone knows another solution.
22:21
<Hixie_>
what do you mean by "utf characters"?
22:21
<galant>
Hixie_, see pm :)
22:21
<Hixie_>
are you saying you just want to display a text file in a page without interpreting as html?
22:22
<philandy>
no, an html file as if it were a text file.
22:22
<Hixie_>
galant: saw it, wasn't sure what you wanted me to do with it :-)
22:22
<philandy>
and yes, without interpreting it as html
22:22
<galant>
haha nothing :))
22:22
<Hixie_>
philandy: just change the MIME type on the server to text/plain, and load it in an iframe
22:23
<Hixie_>
philandy: or fetch the file using XMLHttpRequest, then set a <pre> element's "textContent" idl attribute to the document's text source
22:23
<galant>
that site has plenty transitions and canvas and is slow on my old laptop :(
22:24
<dglazkov>
did tests in https://code.google.com/p/html5lib/source/browse/#hg%2Ftestdata%2Ftree-construction make it to https://github.com/w3c/web-platform-tests/tree/master/html?
22:25
<dglazkov>
I sort of see naming parallels, but the tests in github look nasty: https://github.com/w3c/web-platform-tests/blob/master/html/syntax/parsing/test_adoption01.html
22:25
<GPHemsley>
so apparently the new Chrome implementation of mouse(enter|leave) patterns with Opera on entry and nobody on exit
22:25
<GPHemsley>
https://www.w3.org/Bugs/Public/show_bug.cgi?id=22641#c4
22:26
<philandy>
I was considering the pre tag, but was unsure there was a quick solution. I dislike iframe, object, and embed because they have issues with height that aren't exactly simple to resolve.
22:38
<gsnedders>
dglazkov: That's them in jgraham's wrapper.
22:38
<gsnedders>
dglazkov: I don't claim they're clean.
22:39
<gsnedders>
dglazkov: Also, see the home page of the html5lib project on Google Code. (Hint: you want https://github.com/html5lib/html5lib-tests)
22:44
<Hixie_>
http://www.w3.org/mid/CAEeYn8hWz9QA53VSseB=xFLwo+WuS4YPH19Ad+wHpheQp-nwpA⊙mgc christ, w3c are forking more of anne's specs
22:46
<philandy>
Hixie_: do you know what xmp broke in SGML?
22:47
<gsnedders>
23:38 < gsnedders> dglazkov: That's them in jgraham's wrapper.
22:47
<gsnedders>
23:38 < gsnedders> dglazkov: I don't claim they're clean.
22:47
<gsnedders>
23:39 < gsnedders> dglazkov: Also, see the home page of the html5lib project on Google Code. (Hint: you want https://github.com/html5lib/html5lib-tests)
22:48
<Hixie_>
philandy: i don't understand the question
22:50
<philandy>
It was sort of a parting question. The reason that xmp was depreciated was that it broke SGML. I was wondering if you knew what parts.
22:50
<Hixie_>
why do you think the reason <xmp> was deprecated was that it broke SGML?
22:51
<Hixie_>
("depreciated" means "lost value", "deprecated" means "warned against")
22:52
<philandy>
wow, okay. deprecated.
22:53
<philandy>
I had to refer back to the html 3.2 reference to see it
22:54
<Hixie_>
http://whatwg.org/html#xmp mentions it
23:03
<philandy>
Hixie_: I see it. I think I'm going to use an iframe, object, or embed depending on which doesn't feel like breaking everything.
23:04
<Hixie_>
<embed> is for plugins
23:05
<Hixie_>
<object> and <iframe> should be basically the same thing, though <iframe> is the better choice in your case
23:10
<philandy>
Hixie_ I agree. I want to follow the standards to do it right if possible. I seem to want to do the worst possible things from time to time >_<
23:18
<Hixie_>
abarth: ping?
23:18
<abarth>
Hixie_: hi
23:18
<Hixie_>
oooh, that was quick
23:18
<Hixie_>
hey
23:19
<Hixie_>
what do you know about CSP and cross-origin seamless iframes and so forth?
23:19
<Hixie_>
i have feedback saying it's wanted, and some says that CSP and/or X-Frame-Options and/or other things are supposed to do the security model aspect of this
23:19
<Hixie_>
so i don't have to reinvent an origin-opt-in mechanism a la CORS
23:24
<Hixie_>
abarth: ^
23:24
<abarth>
sorry
23:24
<abarth>
yeah
23:24
<abarth>
i don't think anyone has done anythign in that area yet
23:24
<abarth>
I think Ojan or I raised it on the list
23:24
<abarth>
and the feedback we got (maybe from you) was to wait for more seamless adoption before adding featuers
23:25
<abarth>
that's what we've been doing
23:25
<abarth>
I think moz has an implementation now
23:25
<abarth>
maybe even finished it. I haven't checked their status in a bit
23:25
<abarth>
My understanding is that folks are still asking for the feature
23:27
<Hixie_>
abarth: can you elaborate on http://lists.w3.org/Archives/Public/public-whatwg-archive/2012Dec/0012.html ?
23:27
<Hixie_>
did anything happen with that?
23:28
<abarth>
X-Frame-Options did become a CSP directive
23:28
<abarth>
the folks who were pushing the HTTP header approach in the IETF agreed to move to the W3C
23:28
<abarth>
there's still an informational RFC in the works in the IETF that documents the existing X-Frame-Options implementations
23:29
<abarth>
but the Frame-Options iteration got moved into CSP
23:29
<Hixie_>
still wouldn't help with seamless though right?
23:29
<Hixie_>
for seamless it seems we need a way for a page to give an opt-in list of domains that can do the seamless embedding
23:29
<Hixie_>
very similar to CORS
23:29
<Hixie_>
but not CORS, obviously
23:30
<Hixie_>
i'm so skeptical about introducing yet another mechanism
23:35
<abarth>
do you mean directly?
23:35
<abarth>
it's a bit different than frame-options
23:35
<abarth>
which doesn't grant anyone additional privileges
23:35
<Hixie_>
yeah
23:35
<abarth>
just revokes privieleges from everyone else
23:36
<abarth>
you're looking for something more like CORS...
23:36
<abarth>
i guess the question
23:36
<abarth>
...
23:37
<abarth>
do you want to be able to specify a list of origins?
23:37
<abarth>
CORS only lets you say one
23:37
<abarth>
e.g., *.example.com
23:37
<Hixie_>
it's unclear to me what the use cases are, so i don't know if one is enough or not.
23:37
<Hixie_>
but in principle, if it's enough for CORS, it should be enough for this.
23:38
<abarth>
I can tell you about use cases that I have personally
23:38
<abarth>
if that would be helpful
23:38
<Hixie_>
sure
23:39
<abarth>
https://bugs.webkit.org/show_bug.cgi?id=110252 <--- This is just a random WebKit bug, but you can see the red and green bubbles next to each attachment?
23:39
<abarth>
those are an iframe to a page hosted on another server
23:40
<abarth>
it would be nice if the iframe could automatically resize to fit the number of bubbles that are there
23:40
<abarth>
today, someone has to go edit the bugzilla code to change the constant whenever the max number of bubbles changes
23:41
<Hixie_>
but presumably you'd want anyone to be able to embed those
23:41
<abarth>
seamless would do the job, except the reason I used an iframe in the first place is because the data is hosted on another server
23:41
<abarth>
yeah, * would be fine here
23:41
<abarth>
this is public data
23:41
<Hixie_>
if it was a non-open project, you'd want anyone inside the intranet to be able to use it
23:41
<Hixie_>
which would be hard without a list of domains
23:41
<Hixie_>
if your intranet is like some companies'
23:42
<abarth>
yes, you'd want to be able to say something like *.corp.example.com
23:43
<Hixie_>
i was thinking of "intranets" that are more "extranets" and have a number of domains
23:46
<abarth>
well, the issue arises even for intranets
23:46
<abarth>
because the framing site could be on the internet
23:46
<abarth>
and the browser could be inside the firewall
23:47
<abarth>
i.e., if the project was closed source and internal to some company
23:47
<abarth>
but the bubble server said allow-seamless=*
23:48
<Hixie_>
right, my argument was that this use case, in the private case, implied you'd need a list.
23:48
<abarth>
then an internet site could determine how many bubbles were tehre
23:48
<abarth>
ah, yess
23:48
<abarth>
sorry, i misunderstood
23:48
<Hixie_>
but i guess we could do what CORS does, which is require the server to send the right header based on the incoming Origin header
23:48
<philandy>
btw, I was told Chrome isn't using WebKit anymore? Something called Blink?
23:49
<Hixie_>
philandy: blink is a fork of webkit, see http://www.chromium.org/blink
23:49
<Hixie_>
abarth: although i don't know if we can send the origin header for all iframe requests...
23:49
<Hixie_>
abarth: i guess we only need to send it if the seamless attribute is set
23:50
<Hixie_>
abarth: in any case, my original contention was that i didn't want to invent a new cors-like mechanism
23:51
<abarth>
philandy: that's true, but I created this bubble system, which is why I'm familiar with it ;)
23:52
<abarth>
Hixie_: yeah, like many issues, the question boils down to whether you think the Vary header works
23:52
<abarth>
if you think it works, then the server can Vary: Origin and still get reasonable caching
23:52
<abarth>
IMHO, CORS is probably a good place to start
23:53
<abarth>
that makes it clear that by allowing someone to embed you seamlessly
23:53
<abarth>
you're letting them read the contents of your document
23:53
<abarth>
that's not 100% accurate
23:53
<abarth>
but it's a good, conservative first approximation
23:53
<abarth>
(e.g., you might be able to keep CSRF tokens secret because they're hidden)