Return-Path: X-Original-To: apmail-cordova-dev-archive@www.apache.org Delivered-To: apmail-cordova-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id C3F89D7A2 for ; Fri, 9 Nov 2012 23:02:51 +0000 (UTC) Received: (qmail 59041 invoked by uid 500); 9 Nov 2012 23:02:51 -0000 Delivered-To: apmail-cordova-dev-archive@cordova.apache.org Received: (qmail 59008 invoked by uid 500); 9 Nov 2012 23:02:51 -0000 Mailing-List: contact dev-help@cordova.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: dev@cordova.apache.org Delivered-To: mailing list dev@cordova.apache.org Received: (qmail 59000 invoked by uid 99); 9 Nov 2012 23:02:51 -0000 Received: from athena.apache.org (HELO athena.apache.org) (140.211.11.136) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 09 Nov 2012 23:02:51 +0000 X-ASF-Spam-Status: No, hits=-0.7 required=5.0 tests=RCVD_IN_DNSWL_LOW,SPF_PASS X-Spam-Check-By: apache.org Received-SPF: pass (athena.apache.org: domain of gtanner@gmail.com designates 209.85.223.175 as permitted sender) Received: from [209.85.223.175] (HELO mail-ie0-f175.google.com) (209.85.223.175) by apache.org (qpsmtpd/0.29) with ESMTP; Fri, 09 Nov 2012 23:02:46 +0000 Received: by mail-ie0-f175.google.com with SMTP id c13so6806918ieb.6 for ; Fri, 09 Nov 2012 15:02:25 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=subject:references:from:content-type:x-mailer:in-reply-to :message-id:date:to:content-transfer-encoding:mime-version; bh=QhIdNYpxwJDOwr09cHcjWSZglrlvToRWJWEhySXmMuU=; b=djPNB0utNK+CkrR8MTZ9zhtZnL7K5A3EX1g4PAAY5SahejwqThsX8vqCRIjdD36vew FWldZYUwR3roxF1TF8d11B1gNbwiA4/eA9aLvUD57aBWA5QoEfF+5j5sV5hPZxISllIf OUWeeTdRtC6EKj3LsqDQ2aS9sVSPUSaRyU7dmiqYf5qdcmLe/WvbkEl8tAjnwPOk5Uu5 Qc4TyNLVfwBFCY52wdXFLDAGkSUXhd2FyQlr+HNDDOOCMGOkKFJWpwz6GoWlCyFlKYtg zPzACc+nRR48LpxcWPiOdO4Gf6F/nO2w3eZOH0G0apn8eg0G9Lu3vgTPCJmigP4um5b2 0+LA== Received: by 10.42.175.5 with SMTP id ay5mr11445654icb.10.1352502145270; Fri, 09 Nov 2012 15:02:25 -0800 (PST) Received: from [192.168.1.3] (CPE000d3a725498-CM001cea87a5dc.cpe.net.cable.rogers.com. [173.32.255.15]) by mx.google.com with ESMTPS id wh5sm2310985igb.17.2012.11.09.15.02.24 (version=SSLv3 cipher=OTHER); Fri, 09 Nov 2012 15:02:24 -0800 (PST) Subject: Re: InAppBrowser api questions References: From: Gord Tanner Content-Type: text/plain; charset=us-ascii X-Mailer: iPhone Mail (10A523) In-Reply-To: Message-Id: <206D8B05-3F94-4CFF-83C8-5F58188A1C89@gmail.com> Date: Fri, 9 Nov 2012 18:02:23 -0500 To: "dev@cordova.apache.org" Content-Transfer-Encoding: quoted-printable Mime-Version: 1.0 (1.0) X-Virus-Checked: Checked by ClamAV on apache.org Nice!!! When is the next release? I will create a jira to track looking into getting= the child browser plugin working for Cordova once the bb10 API is available= On 2012-11-09, at 3:24 PM, Nukul Bhasin wrote: > BB10 WebWorks implements something similar. It will be a part of the next > release >=20 > here is the definition for what we implemented for BB10 >=20 > https://github.com/blackberry/BB10-WebWorks-Framework/issues/230 >=20 >=20 > On Fri, Nov 9, 2012 at 12:43 PM, Shazron wrote: >=20 >> WIki page: http://wiki.apache.org/cordova/InAppBrowser >> Some questions brought up by Jesse in JIRA (replicated below): >> http://goo.gl/cZe84 >>=20 >> ---------------------------------------------------- >> Jesse MacFadyen: >>=20 >> I have some open questions about the wiki defined 'spec' >>=20 >> 1. window.open('http://random-url.com', '_self'); // loads in InAppBrowse= r >> so even though the random-url is not whitelisted, it is permitted to >> load within the application, inside the InAppBrowser. This is currently n= ot >> trivial on iOS. >>=20 >> 2. How can I open a whitelisted url in the native browser? ie. mobile >> safari >> there is no clear path to targeting ALL 3 possibilities or a)the app >> page, b) the InAppBrowser, c) the system browser ( for a whitelisted URL )= >> it makes sense that you cannot open a file:// url in the system browse= r >> + you cannot open a non-whitelisted url in the app. >>=20 >> ---------------------------------------------------- >>=20 >> My comments: >>=20 >> 1. This as Jesse points out, is not trivial on iOS. The "easy way" would b= e >> to not allow this, but kick it out to the system browser (Mobile Safari),= >> and have that as a general rule, any non-whitelisted URLs for the >> InAppBrowser are kicked out to the system browser. I don't know how hard i= t >> is for Android. >>=20 >> If we were to do this, we would have to temporarily allow the url to bypa= ss >> the whitelist which could be kludgy (since we can't know what other URLs >> that URL will load) -- essentially this issue >> http://issues.cordova.io/1695would totally solve this correctly, but >> we don't have a solution yet for >> that issue. >>=20 >> 2. This case has not been addressed. I would think _blank would be the ca= se >> but this is specified as the InAppBrowser here. How about this case, we >> could use _parent for InAppBrowser, but _blank for system browser? Howeve= r, >> this would not be consistent with how the other calls are specified (unle= ss >> we change the others to be consistent). >>=20 >> Another possible solution is to kick out to the system browser if an >> unknown value is used (some random value), that will use the system >> browser, which is consistent with how window.open works. >=20 >=20 >=20 > --=20 > *Nukul Bhasin* > *Computer Engineer, B.Eng* > *10 Queens Quay W, suite#1710* > *Toronto, ON, Canada* > *Ph: 416 508 3157*