Closed Bug 1000146 Opened 10 years ago Closed 10 years ago

Desktop client needs to bypass the media device permission prompt

Categories

(Hello (Loop) :: Client, defect, P1)

defect

Tracking

(Not tracked)

RESOLVED DUPLICATE of bug 1015486
mozilla33

People

(Reporter: RT, Unassigned)

References

Details

(Whiteboard: [p=?][MVP, addresses bug 1010325 comments][investigation])

User Story

As a FF browser user, I can answer without having to validate access to my microphone or camera, so that the experience is smoother.
As a FF browser user, I can place calls without having to validate access to my microphone or camera, so that the experience is smoother.

As part of this, we need to back out/remove the workaround in bug 1010325 as per the review comments there.
      No description provided.
User Story: (updated)
Blocks: 972014
Depends on: 990678
Priority: -- → P1
Target Milestone: --- → mozilla32
Priority: P1 → P2
Whiteboard: [s=fx32]
Whiteboard: [s=fx32] → [s=ui32]
Blocks: 1012743
No longer blocks: 972014
User Story: (updated)
Whiteboard: [s=ui32] → [s=ui32][must fix for mvp, to address bug 1010325 comments]
Priority: P2 → P1
Whiteboard: [s=ui32][must fix for mvp, to address bug 1010325 comments] → [p=?][must fix for mvp, to address bug 1010325 comments]
Target Milestone: mozilla32 → mozilla33
Dan Mosedale: Right now, we're using the microphone / video permissions dialog as an ugly part of our call answering UX.  We need to somehow make it possible for Loop code to to call getUserMedia without those dialogs in order to implement the reasonable call answering UX (see https://people.mozilla.org/~dhenein/labs/loop-mvp-spec/#call-incoming and bug 990678 for that).

A couple of possible solutions I could imagine include giving the Loop about: URIs principals that would allow for this (though see bug 976109 for a glimpse at what that might entail), or exposing a slightly different version of getUserMedia through the mozLoopAPI.

Different solutions would almost certainly produce different estimates, so it'd be good to have some discussion about what's likely to be acceptable to the module owners and security folks (jesup, dveditz, ...) before estimating.
Status: NEW → RESOLVED
Closed: 10 years ago
Resolution: --- → DUPLICATE
Whiteboard: [p=?][must fix for mvp, to address bug 1010325 comments] → [p=?][MVP, addresses bug 1010325 comments][investigation]
You need to log in before you can comment on or make changes to this bug.