Confirmed users
1,340
edits
No edit summary |
|||
(22 intermediate revisions by 5 users not shown) | |||
Line 1: | Line 1: | ||
= Description = | = Description = | ||
This proposal is just a tweaked version of the [https://wiki.mozilla.org/WebAPI/Inter_App_Communication Inter App Communication API]. Its description, | This proposal is just a tweaked version of the [https://wiki.mozilla.org/WebAPI/Inter_App_Communication Inter App Communication API]. Its description, intent, and use cases do not defer from the previous proposal, only the API does. See [https://bugzilla.mozilla.org/show_bug.cgi?id=876397 bug 876397] for implementation. | ||
= API = | = API = | ||
== | == Publisher == | ||
partial interface Application { | partial interface Application { | ||
// The returned Promise will be resolved if at least one peer is | // The returned Promise will be resolved if at least one peer is | ||
Line 24: | Line 24: | ||
* ''keyword'' is the key string subject of the connection. Only apps advertising themselves as able to connect through this keyword will receive a connection request (if the user allows to and the app fulfills the requirements specified in the ''rules'' argument). | * ''keyword'' is the key string subject of the connection. Only apps advertising themselves as able to connect through this keyword will receive a connection request (if the user allows to and the app fulfills the requirements specified in the ''rules'' argument). | ||
* ''rules'' (optional) is an object containing a set of constraints for the requested connection. Only apps fulfilling these constraints will receive a connection request. These rules may contain: | * ''rules'' (optional) is an object containing a set of constraints for the requested connection. Only apps fulfilling these constraints will receive a connection request. These rules may contain: | ||
** ''minimumAccessLevel'' is the minimum level of access (one of https://developer.mozilla.org/en-US/docs/Web/Apps/Manifest#type) that the | ** ''minimumAccessLevel'' is the minimum level of access (one of https://developer.mozilla.org/en-US/docs/Web/Apps/Manifest#type) that the subscriber app requires in order to be able to receive the connection request. The default value will be 'web'. | ||
** ''installOrigins'' (array) list of install origins from where subscriber apps should have been installed. Since certified apps has not a ''valid'' install origin, these constraint does not apply to them. | |||
** ''installOrigins'' (array) list of install origins from where | |||
== | == Subscriber == | ||
Applications can advertise themselves as able to connect given an specific keyword by adding an entry named ''connections'' in their manifests containing an object list where each object represents the description and details of each potential connection. | Applications can advertise themselves as able to connect given an specific keyword by adding an entry named ''connections'' in their manifests containing an object list where each object represents the description and details of each potential connection. | ||
Line 41: | Line 39: | ||
'rules': { | 'rules': { | ||
'minimumAccessLevel': 'web', | 'minimumAccessLevel': 'web', | ||
'installOrigins': ['install_origin_1', 'install_origin_n'] | |||
'installOrigins': ['install_origin_1', 'install_origin_n' | |||
} | } | ||
}, | }, | ||
Line 62: | Line 55: | ||
* ''rules'' is an object containing a set of constraints to be fulfilled by connection requesters. These rules may contain: | * ''rules'' is an object containing a set of constraints to be fulfilled by connection requesters. These rules may contain: | ||
** ''minimumAccessLevel'' is the minimum level of access (one of https://developer.mozilla.org/en-US/docs/Web/Apps/Manifest#type) that the requester app requires in order to be able to send a connection request. The default value will be 'web'. | ** ''minimumAccessLevel'' is the minimum level of access (one of https://developer.mozilla.org/en-US/docs/Web/Apps/Manifest#type) that the requester app requires in order to be able to send a connection request. The default value will be 'web'. | ||
** ''installOrigins'' (array) list of install origins from where the requester apps should have been installed. Since certified apps has not a ''valid'' install origin, these constraint does not apply to them. | ** ''installOrigins'' (array) list of install origins from where the requester apps should have been installed. Since certified apps has not a ''valid'' install origin, these constraint does not apply to them. | ||
=== Connection acknowledgement === | === Connection acknowledgement === | ||
Applications that fulfill the rules specified in the ''.connect()'' call and have explicitly been allowed by the user to connect with the | Applications that fulfill the rules specified in the ''.connect()'' call and have explicitly been allowed by the user to connect with the publisher application will receive a system message named 'connection' containing a ''InterAppConnectionRequest'' object of this form as a ''message''. | ||
interface InterAppConnectionRequest { | interface InterAppConnectionRequest { | ||
Line 87: | Line 78: | ||
void postMessage(in jsval message); | void postMessage(in jsval message); | ||
attribute jsval onmessage; | attribute jsval onmessage; | ||
attribute jsval onstart; | // To Fernando: we should try to avoid defining the following two event handlers | ||
attribute jsval onclose; | // so that we can reuse the formal W3C MessagePort. Need to discuss about this. | ||
<strike>attribute jsval onstart;</strike> | |||
<strike>attribute jsval onclose;</strike> | |||
}; | }; | ||
== | == InterAppConnection == | ||
A '' | A ''InterAppConnection'' object represents a connection between two apps through an specific keyword. | ||
interface | interface InterAppConnection { | ||
readonly attribute DOMString keyword; | readonly attribute DOMString keyword; | ||
readonly attribute DOMString publisher; | readonly attribute DOMString publisher; | ||
Line 101: | Line 94: | ||
}; | }; | ||
'' | ''InterAppConnection'' objects will be obtained within a resolved ''Promise'' returned by a ''getConnections()'' call. This function is likely going to be called by a settings application that intends to show the user a list of existing connections, allowing her to cancel them if needed. | ||
= Defer mechanism = | = Defer mechanism = | ||
Line 134: | Line 127: | ||
where it advertises itself as able to receive connections through the 'musictrack' keyword, requested by apps installed from the Firefox Marketplace and handled within the ''musicmanager.html'' page. | where it advertises itself as able to receive connections through the 'musictrack' keyword, requested by apps installed from the Firefox Marketplace and handled within the ''musicmanager.html'' page. | ||
On the other side, the Gaia Music app that wants to be controlled from the lockscreen (and only from there) should add the following ' | On the other side, the Gaia Music app that wants to be controlled from the lockscreen (and only from there) should add the following 'connections' field to its manifest: | ||
{ | { | ||
'name': 'Music', | 'name': 'Music', | ||
Line 142: | Line 135: | ||
'description': 'Play, pause and stop music tracks', | 'description': 'Play, pause and stop music tracks', | ||
'rules': { | 'rules': { | ||
} | } | ||
} | } | ||
Line 165: | Line 157: | ||
=== Current track showed in the lockscreen === | === Current track showed in the lockscreen === | ||
Gaia Music starts playing a random track and wants to share the information about this track with other apps. Since the shared information is harmless, it doesn't care about the | Gaia Music starts playing a random track and wants to share the information about this track with other apps. Since the shared information is harmless, it doesn't care about the subscriber, so no rules are required while requesting the connection. | ||
connect('musictrack').then(function onConnectionAccepted(ports) { | connect('musictrack').then(function onConnectionAccepted(ports) { | ||
// If the connection is allowed at least by one peer, the resolved callback | // If the connection is allowed at least by one peer, the resolved callback | ||
// will be triggered with a list of | // will be triggered with a list of InterAppMessagePort as parameter (ports in this case). | ||
ports.forEach(function(port) { | ports.forEach(function(port) { | ||
// We still need to wait for the connected peer to notify as able to start | // We still need to wait for the connected peer to notify as able to start | ||
Line 194: | Line 186: | ||
}); | }); | ||
The System app only allows connections with apps installed from the Firefox Marketplace (or from certified apps). In this case, the | The System app only allows connections with apps installed from the Firefox Marketplace (or from certified apps). In this case, the publisher (Gaia Music app) is a certified app, so the connection request is allowed by the platform. Assuming that the lockscreen (System app) is the only application advertising itself as able to connect through the 'musictrack' keyword and there is no record of a previously allowed connection between this two apps through this keyword, a popup will be shown to the user saying something like: | ||
Do you want to allow ''Music'' (music.gaiamobile.org) to connect with ''System'' (system.gaiamobile.org) to ''Show the currently played music track information in the lockscreen''? [Allow|Deny] | Do you want to allow ''Music'' (music.gaiamobile.org) to connect with ''System'' (system.gaiamobile.org) to ''Show the currently played music track information in the lockscreen''? [Allow|Deny] | ||
Line 214: | Line 206: | ||
}); | }); | ||
A similar connection request coming from Sonbirdy would also be allowed by the platform, cause we said that this app was installed from the Firefox Marketplace. However a connection request coming from iTunos would be rejected by the platform, since this app is unprivileged web content installed from an unknown source non listed within the lockscreen app rules. This request will not trigger any system messages and so the | A similar connection request coming from Sonbirdy would also be allowed by the platform, cause we said that this app was installed from the Firefox Marketplace. However a connection request coming from iTunos would be rejected by the platform, since this app is unprivileged web content installed from an unknown source non listed within the lockscreen app rules. This request will not trigger any system messages and so the subscriber won't ever be awake because of it (in this case the subscriber (System app) is already live though). | ||
=== Music controls in the lockscreen === | === Music controls in the lockscreen === | ||
Line 220: | Line 212: | ||
The lockscreen, in this example, wants to control '''only''' (no reasons, just an example) the music from the Gaia Music app (known origin). Once the lockscreen is ready, it sends a connection request of this kind: | The lockscreen, in this example, wants to control '''only''' (no reasons, just an example) the music from the Gaia Music app (known origin). Once the lockscreen is ready, it sends a connection request of this kind: | ||
connect('musicremotecontrol' | connect('musicremotecontrol').then((function onConnectionAccepted(ports) { | ||
if (ports.length > 1) { | if (ports.length > 1) { | ||
// We shouldn't be here as we only want to communicate with the Gaia Music app. | // We shouldn't be here as we only want to communicate with the Gaia Music app. | ||
Line 258: | Line 248: | ||
'Do you want to allow ''System'' (system.gaiamobile.org) to communicate with ''Music'' (music.gaiamobile.org) to ''Play, pause and stop music tracks''? [Accept|Reject]' | 'Do you want to allow ''System'' (system.gaiamobile.org) to communicate with ''Music'' (music.gaiamobile.org) to ''Play, pause and stop music tracks''? [Accept|Reject]' | ||
Even if ''Songbirdy'' and ''iTunos'' advertise themselves as able to connect through the 'musicremotecontrol' keyword, as the request is done with a specific rule that requires the | Even if ''Songbirdy'' and ''iTunos'' advertise themselves as able to connect through the 'musicremotecontrol' keyword, as the request is done with a specific rule that requires the subscriber to have the 'music.gaiamobile.org' origin, these apps won't be listed in the above UI and won't receive any system message with a connection request. | ||
The user allows that connection and a system message is sent to the Music app. | The user allows that connection and a system message is sent to the Music app. | ||
Line 290: | Line 280: | ||
* We might want to have a bigger set of types to allow apps to connect (web, installed, signed, privileged, certified). | * We might want to have a bigger set of types to allow apps to connect (web, installed, signed, privileged, certified). | ||
[[Category:Web APIs]] |