08:31
<Ms2ger 💉💉>
"of a glacier (hist.)"
10:02
<sideshowbarker>
looking at https://github.com/mdn/content/issues/12370
10:02
<sideshowbarker>

calling backgroundFetch.fetch() for a chrome-extension URL throws with:

TypeError: Failed to execute 'fetch' on 'BackgroundFetchManager': Refused to fetch 'chrome-extension://xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx/stream' because only the https: scheme is allowed, or http: for loopback IPs.

10:02
<sideshowbarker>
…but where, in which spec, is that requirement defined?
10:03
<sideshowbarker>
it seems like it’s probably because it requires a secure context, but I don’t see anywhere in https://wicg.github.io/background-fetch/ that actually states it needs to be a secure context
10:03
<sideshowbarker>
and I don’t see the SecureContext WebIDL attribute anywhere
10:18
<Andreu Botella (he/they)>
I don't know about whether BackgroundFetch adds further requirements, but regular fetch only supports a few schemes: https://fetch.spec.whatwg.org/#scheme-fetch
11:20
<annevk>
Luca Casonato: I assume https://github.com/whatwg/spec-factory/pull/35#issuecomment-1019990419 looks okay?
11:26
<sideshowbarker>
I don't know about whether BackgroundFetch adds further requirements, but regular fetch only supports a few schemes: https://fetch.spec.whatwg.org/#scheme-fetch
True but regular fetch at least does support http schemes
11:28
<sideshowbarker>
…but that because only the https: scheme is allowed, or http: for loopback IPs message seems to make clear that BackgroundFetch is even disallowing http — so it’s enforcing some requirement beyond regular fetch
11:28
<sideshowbarker>
the problem is that the Background Fetch spec itself doesn’t seem to state any such requirement
11:29
<sideshowbarker>
I guess it’s possible that Chrome is imposing some additional requirement beyond what’s in the spec
11:49
<annevk>
sideshowbarker: did you try data: URLs? If that doesn't work it is, but otherwise it would follow from Mixed Content
11:50
<sideshowbarker>
haven’t tried that yet but will
11:53
<sideshowbarker>
but now I wonder, does Mixed Content say anything about fetches for unknown URL schemes from secure contexts?
11:54
<sideshowbarker>
I mean, I don’t expect it says anything about the chrome-extension scheme specifically, but maybe something more general
11:54
<sideshowbarker>
I guess I should just look myself and see
11:56
<sideshowbarker>
hmm I guess it comes down to chrome-extension not being explicitly defined as “potentially trustworthy” https://w3c.github.io/webappsec-secure-contexts/#potentially-trustworthy-origin
13:31
<annevk>
sideshowbarker: well Fetch only allows https://fetch.spec.whatwg.org/#fetch-scheme
13:33
<sideshowbarker>
yeah but if that’s the restriction the browser were enforcing in this case, it seems like the browser would be logging an error message which says that, rather than the different error message it is actually logging in this case
13:34
<Luca Casonato>
Luca Casonato: I assume https://github.com/whatwg/spec-factory/pull/35#issuecomment-1019990419 looks okay?
LGTM!
13:34
<Luca Casonato>
Thanks for getting this landed :-)
14:26
<annevk>
Ms2ger 💉💉: maybe file a bug against Deno/Node.js for Exposed=* changes too? https://github.com/whatwg/meta/blob/main/MAINTAINERS.md#handling-pull-requests
14:27
<Ms2ger 💉💉>
Oh, that's new, is it? Will do
14:27
<Andreu Botella (he/they)>
For Deno, link to https://github.com/denoland/deno/issues/13239, since it's gonna take a while to sort that out
14:28
<annevk>
Thanks! (And yeah, today-ish new.)
14:28
<Andreu Botella (he/they)>
(cue Ms2ger 💉💉 insisting on me switching to the compilers team at Igalia 🤣)
14:29
<Ms2ger 💉💉>
:)
17:24
<mgaudet>

👋 Trying to reason a bit about the expectation around globals and WebIDL interfaces.

I've been looking at some of the JS engine tests we wrote for or streams. One of which tries to assert that if you invoke another global's ReadableStream.prototype.getReader with a stream in your current realm, you get a reader back that is in the other global, not your current one (tested using instanceof)

Right now, Safari and Chrome disagree: Safari has the reader in a different global, Chrome has it in the current global. Firefox disagrees with itself depending on which streams implementation I test: JS-implemented streams agrees with Safari, DOM+WebIDL implemented streams agrees with Chrome.

17:25
<mgaudet>
So, in this exact case, the question is one of: Which realm is implied by Step 1 of AcquireReadableStreamDefaultReader, "let reader be a new ReadableStreamDefaultReader" ? new links to the WebIDL spec which asks a specification to specify a realm...
17:38
<Schalk Neethling>
Hey All! Hope this is the appropriate place to ask questions like this. I am reading through the HTML specifications and I was wondering whether a FAQ page would be considered a valid use case for the details and summary elements? For example https://codepen.io/schalkneethling/pen/524ed00bc39a135f0d76de3c1519eaeb?editors=1100 - Thank you in advance.
17:52
<Domenic>
So, in this exact case, the question is one of: Which realm is implied by Step 1 of AcquireReadableStreamDefaultReader, "let reader be a new ReadableStreamDefaultReader" ? new links to the WebIDL spec which asks a specification to specify a realm...
This is not well-specified in the spec, I agree. The intention is generally, per https://github.com/heycam/webidl/issues/135 , that in ReadableStream.prototype.getReader.call(x), it comes from x's global.
17:59
<mgaudet>
Ok. That works for me. Is this the kind of thing that I should (maybe eventually no promises) submit WPT tests for, or better to let things lie (given Safari currently does it by realm)
17:59
<Domenic>
WPTs would be super-lovely if possible. I will try to work on the spec side soon-ish.
18:00
<Schalk Neethling>
Hey All! Hope this is the appropriate place to ask questions like this. I am reading through the HTML specifications and I was wondering whether a FAQ page would be considered a valid use case for the details and summary elements? For example https://codepen.io/schalkneethling/pen/524ed00bc39a135f0d76de3c1519eaeb?editors=1100 - Thank you in advance.
I guess another use case is for a tools sidebar. Something like https://codepen.io/schalkneethling/pen/09dbffb3dde2d48a0dd76667790648bc
18:24
<TabAtkins>
Schalk Neethling: It's fine semantically, but practically I think it's only really usable in current Chrome, which now has the ability for find-in-page, url hashes, etc to automatically open details when appropriate. When other browsers support that as well, it'll be more broadly usable.
18:27
<Schalk Neethling>
Schalk Neethling: It's fine semantically, but practically I think it's only really usable in current Chrome, which now has the ability for find-in-page, url hashes, etc to automatically open details when appropriate. When other browsers support that as well, it'll be more broadly usable.
Thanks TabAtkins , can you point me to some reading material around this? Would be much appreciated.
18:27
<Schalk Neethling>
I have also heard that the dialog element is not accessible ☹️ Is this true?
18:31
<TabAtkins>
https://twitter.com/JosephArhar/status/1479525286211248128