Closed
Bug 1793710
Opened 2 years ago
Closed 2 years ago
[CTW] Support MSAA string role hack
Categories
(Core :: Disability Access APIs, task)
Tracking
()
RESOLVED
FIXED
107 Branch
Tracking | Status | |
---|---|---|
firefox107 | --- | fixed |
People
(Reporter: Jamie, Assigned: Jamie)
References
(Blocks 1 open bug)
Details
Attachments
(1 file)
(deleted),
text/x-phabricator-request
|
Details |
Gecko has a hack where it exposes strings for unmapped MSAA roles. We want to remove this hack; see bug 798492. However, that involves figuring out 44 mappings, which is not something I want to spend time on right now.
For RemoteAccessible, we just return E_FAIL in this case. That's not ideal and might confuse a client or at least make someone think something is broken when it isn't. Instead, we should return a string as best we can.
I originally wrote this patch to see if it fixed live regions with JAWS (bug 1786240). Sadly, it doesn't, but since I've written the patch, I may as well submit it.
Assignee | ||
Comment 1•2 years ago
|
||
Pushed by jteh@mozilla.com:
https://hg.mozilla.org/integration/autoland/rev/73b5d1dba5af
Partially support MSAA role string hack for cached RemoteAccessible to avoid returning failure. r=morgan
Comment 3•2 years ago
|
||
bugherder |
Status: NEW → RESOLVED
Closed: 2 years ago
status-firefox107:
--- → fixed
Resolution: --- → FIXED
Target Milestone: --- → 107 Branch
You need to log in
before you can comment on or make changes to this bug.
Description
•