Closed Bug 1793710 Opened 2 years ago Closed 2 years ago

[CTW] Support MSAA string role hack

Categories

(Core :: Disability Access APIs, task)

Desktop
Windows
task

Tracking

()

RESOLVED FIXED
107 Branch
Tracking Status
firefox107 --- fixed

People

(Reporter: Jamie, Assigned: Jamie)

References

Details

Attachments

(1 file)

Gecko has a hack where it exposes strings for unmapped MSAA roles. We want to remove this hack; see bug 798492. However, that involves figuring out 44 mappings, which is not something I want to spend time on right now.

For RemoteAccessible, we just return E_FAIL in this case. That's not ideal and might confuse a client or at least make someone think something is broken when it isn't. Instead, we should return a string as best we can.

I originally wrote this patch to see if it fixed live regions with JAWS (bug 1786240). Sadly, it doesn't, but since I've written the patch, I may as well submit it.

Pushed by jteh@mozilla.com: https://hg.mozilla.org/integration/autoland/rev/73b5d1dba5af Partially support MSAA role string hack for cached RemoteAccessible to avoid returning failure. r=morgan
Status: NEW → RESOLVED
Closed: 2 years ago
Resolution: --- → FIXED
Target Milestone: --- → 107 Branch
You need to log in before you can comment on or make changes to this bug.

Attachment

General

Created:
Updated:
Size: