Closed
Bug 1000146
Opened 11 years ago
Closed 11 years ago
Desktop client needs to bypass the media device permission prompt
Categories
(Hello (Loop) :: Client, defect, P1)
Hello (Loop)
Client
Tracking
(Not tracked)
RESOLVED
DUPLICATE
of bug 1015486
mozilla33
People
(Reporter: RT, Unassigned)
References
Details
(Whiteboard: [p=?][MVP, addresses bug 1010325 comments][investigation])
User Story
As a FF browser user, I can answer without having to validate access to my microphone or camera, so that the experience is smoother. As a FF browser user, I can place calls without having to validate access to my microphone or camera, so that the experience is smoother. As part of this, we need to back out/remove the workaround in bug 1010325 as per the review comments there.
No description provided.
Reporter | ||
Updated•11 years ago
|
User Story: (updated)
Updated•11 years ago
|
Updated•11 years ago
|
Priority: P1 → P2
Whiteboard: [s=fx32]
Updated•11 years ago
|
Whiteboard: [s=fx32] → [s=ui32]
Updated•11 years ago
|
User Story: (updated)
Whiteboard: [s=ui32] → [s=ui32][must fix for mvp, to address bug 1010325 comments]
Updated•11 years ago
|
Priority: P2 → P1
Whiteboard: [s=ui32][must fix for mvp, to address bug 1010325 comments] → [p=?][must fix for mvp, to address bug 1010325 comments]
Target Milestone: mozilla32 → mozilla33
Comment 1•11 years ago
|
||
Dan Mosedale: Right now, we're using the microphone / video permissions dialog as an ugly part of our call answering UX. We need to somehow make it possible for Loop code to to call getUserMedia without those dialogs in order to implement the reasonable call answering UX (see https://people.mozilla.org/~dhenein/labs/loop-mvp-spec/#call-incoming and bug 990678 for that).
A couple of possible solutions I could imagine include giving the Loop about: URIs principals that would allow for this (though see bug 976109 for a glimpse at what that might entail), or exposing a slightly different version of getUserMedia through the mozLoopAPI.
Different solutions would almost certainly produce different estimates, so it'd be good to have some discussion about what's likely to be acceptable to the module owners and security folks (jesup, dveditz, ...) before estimating.
Updated•11 years ago
|
Status: NEW → RESOLVED
Closed: 11 years ago
Resolution: --- → DUPLICATE
Whiteboard: [p=?][must fix for mvp, to address bug 1010325 comments] → [p=?][MVP, addresses bug 1010325 comments][investigation]
You need to log in
before you can comment on or make changes to this bug.
Description
•