-
Notifications
You must be signed in to change notification settings - Fork 69
Publish minutes of 2025-05-22 meeting #834
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a couple of suggestions for polish. If you're comfortable with them, we're good to merge.
* [Issue 832](https://github.com/w3c/webextensions/issues/832): Spec clarification: TabId 0 | ||
* [Issue 831](https://github.com/w3c/webextensions/issues/831): Canonical header names | ||
* [Issue 833](https://github.com/w3c/webextensions/issues/833): Side Panel API: query position: left/right, close(), and focus(): tab to and from side panel | ||
* **Timely issues** (0 minutes) | ||
* None | ||
* **Check-in on existing issues** (5 minutes) | ||
* [Pull 791](https://github.com/w3c/webextensions/pull/791): Add trial_tokens key to specification ([@oliverdunk](https://github.com/oliverdunk)) | ||
* **Discuss nominated topics** | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Move the topics that were added during the meeting to their own section.
* [Issue 832](https://github.com/w3c/webextensions/issues/832): Spec clarification: TabId 0 | |
* [Issue 831](https://github.com/w3c/webextensions/issues/831): Canonical header names | |
* [Issue 833](https://github.com/w3c/webextensions/issues/833): Side Panel API: query position: left/right, close(), and focus(): tab to and from side panel | |
* **Timely issues** (0 minutes) | |
* None | |
* **Check-in on existing issues** (5 minutes) | |
* [Pull 791](https://github.com/w3c/webextensions/pull/791): Add trial_tokens key to specification ([@oliverdunk](https://github.com/oliverdunk)) | |
* **Discuss nominated topics** | |
* **Timely issues** (0 minutes) | |
* None | |
* **Check-in on existing issues** (5 minutes) | |
* [Pull 791](https://github.com/w3c/webextensions/pull/791): Add trial_tokens key to specification ([@oliverdunk](https://github.com/oliverdunk)) | |
* **Discuss nominated topics** | |
* [Issue 832](https://github.com/w3c/webextensions/issues/832): Spec clarification: TabId 0 | |
* [Issue 831](https://github.com/w3c/webextensions/issues/831): Canonical header names | |
* [Issue 833](https://github.com/w3c/webextensions/issues/833): Side Panel API: query position: left/right, close(), and focus(): tab to and from side panel |
* [oliver] Google I/O talks: https://groups.google.com/a/chromium.org/g/chromium-extensions/c/dRcCXIe4RlQ/m/R056FM6bAAAJ | ||
* [mukul] Microsoft Build Announcements | ||
[Simplified access to AI in Microsoft Edge: Introducing the Prompt and Writing Assistance APIs - Microsoft Edge Blog](https://blogs.windows.com/msedgedev/2025/05/19/introducing-the-prompt-and-writing-assistance-apis/) | ||
[Issue 825](https://github.com/w3c/webextensions/issues/825): Inconsistency: Default content security policy |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
[Issue 825](https://github.com/w3c/webextensions/issues/825): Inconsistency: Default content security policy | |
[Issue 825](https://github.com/w3c/webextensions/issues/825): Inconsistency: Default content security policy |
[Simplified access to AI in Microsoft Edge: Introducing the Prompt and Writing Assistance APIs - Microsoft Edge Blog](https://blogs.windows.com/msedgedev/2025/05/19/introducing-the-prompt-and-writing-assistance-apis/) | ||
[Issue 825](https://github.com/w3c/webextensions/issues/825): Inconsistency: Default content security policy | ||
|
||
* [rob] I have context. A while ago I suggested defaulting to HTTPs in extensions. Good way to help secure use data by transmitting it over secure connections. We've added upgrade requests by default to CSP. This could break some extensions if the backend doesn't support CSP. This creates an inconsistency where we're the only ones that enable HTTPS by default. Developers can easily opt out by specifying a custom CSP without `upgrade-insecure-requests`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* [rob] I have context. A while ago I suggested defaulting to HTTPs in extensions. Good way to help secure use data by transmitting it over secure connections. We've added upgrade requests by default to CSP. This could break some extensions if the backend doesn't support CSP. This creates an inconsistency where we're the only ones that enable HTTPS by default. Developers can easily opt out by specifying a custom CSP without `upgrade-insecure-requests`. | |
* [rob] I have context. A while ago I suggested defaulting to HTTPS in extensions. Good way to help secure use data by transmitting it over secure connections. We've added upgrade requests by default to CSP. This could break some extensions if the backend doesn't support CSP. This creates an inconsistency where we're the only ones that enable HTTPS by default. Developers can easily opt out by specifying a custom CSP without `upgrade-insecure-requests`. |
Generated from https://docs.google.com/document/d/1QkwhEMtMS67JBUkl_WVPZ4lRSKoWcQNlLJSf_GwSXg8/edit using the tool and process from #105.
During this meeting we discussed or mentioned issues #824, #531, #825, #830, #832, #831, #833, #693 and PRs #826, #791.