Sorry, that should be "before instantiating content" (Or "before calling ContentMain")
On Sun, Aug 22, 2021 at 4:51 PM Matt Menke <mme...@google.com> wrote: > I've poked around here, and I'm not sure it's possible to wire this up to > a base::Feature. Headless runs some code before instantiating context, > including parsing a remote debugging IP address from the command line. > This results in calling the IPv4 parser before content, and thus the global > feature list, is loaded, which results in the feature code CHECKing. Even > if we figured out a way to work around this, I'm concerned that other code > not exercised by the trybots may be doing the same thing, which could > result in a lot of unexpected surprises. > > I guess we could add a command line switch to bypass the check, though > that's more difficult to use than a base::Feature, and can't be set > server-side. Open to other ideas. > > On Fri, Aug 20, 2021 at 10:16 AM Matt Menke <mme...@google.com> wrote: > >> On second thought, doesn't seem to be any benefit to a partial rollout on >> prerelease channels, so probably just land it with an enabled by default >> base::Feature. >> >> On Fri, Aug 20, 2021 at 7:57 AM Matt Menke <mme...@google.com> wrote: >> >>> I'm planning to ship it behind a feature (enabled by default, after >>> experimenting on pre-release channels) to allow emergency disabling. >>> >>> On Fri, Aug 20, 2021 at 12:53 AM Yoav Weiss <yoavwe...@chromium.org> >>> wrote: >>> >>>> OK, I'm convinced that these are not "real" hosts, and that breaking >>>> them will not result in actual user-visible breakage. Would it be possible >>>> to ship this with a server-side flag that'd enable us to quickly revert in >>>> case we're wrong? >>>> >>>> On Thu, Aug 19, 2021 at 6:09 PM Matt Menke <mme...@google.com> wrote: >>>> >>>>> So given information on this thread, I think the ways these can >>>>> succeed are possibly: >>>>> 1) Entries in the HOSTS file. >>>>> 2) Intermediary DNS servers or MitMs typo squatting, or actively >>>>> attacking the user. >>>>> 3) Local DNS servers providing additional DNS results. >>>>> 4) Suffix search (which would trigger on, e.g., "1533.67.89" but not >>>>> "67.89.1533") >>>>> 5) mDNS >>>>> 6) Local tools injecting DNS lookup results. >>>>> >>>>> Unfortunately, we don't have a good way to gather hard data on which >>>>> are more common. Given that there are potential security implications >>>>> here, I'm reluctant to wait for another round of data gathering, though we >>>>> could probably distinguish cases 4) and 5) from the others, and 1) as >>>>> well, >>>>> at least on some platforms. Also not sure how useful just knowing about >>>>> those cases would be. >>>>> On Thursday, August 19, 2021 at 11:54:29 AM UTC-4 Harald Alvestrand >>>>> wrote: >>>>> >>>>>> Thanks - I misremembered which end of the class B network got jammed >>>>>> together. 67.89.31533 is indeed the one that is "legal" syntax, and so of >>>>>> course 67.89.1 is too. >>>>>> >>>>>> >>>>>> On Thu, Aug 19, 2021 at 3:20 PM Matt Menke <mme...@google.com> wrote: >>>>>> >>>>>>> Note that 127.0.1 is mapped to 127.0.0.1 by GURL, following the URL >>>>>>> spec, so that would generally not make it to the DNS resolver (unless >>>>>>> something tried to resolve it directly). Per the URL spec, >>>>>>> "31533.67.89" >>>>>>> would not be normalized by GURL, but "67.89.31533" would be converted to >>>>>>> 67.89.123.45. My instrumentation was at the DNS layer, so "127.0.1" and >>>>>>> "67.89.31533" would not show up as problematic hostnames in my metrics, >>>>>>> though "31533.67.89" would. >>>>>>> >>>>>>> On Thu, Aug 19, 2021 at 9:10 AM Harald Alvestrand <h...@google.com> >>>>>>> wrote: >>>>>>> >>>>>>>> An interesting property of all-numeric hostnames is that they *may* >>>>>>>> be legitimate IPv4 addresses using highly archaic IP address formats - >>>>>>>> we're so used to the 123.45.67.89 syntax that we forget that >>>>>>>> 31533.67.89 >>>>>>>> once was regarded as a legitimate way to encode the same address >>>>>>>> (class B >>>>>>>> notation). >>>>>>>> >>>>>>>> There are also certain resolvers that will "helpfully" map an >>>>>>>> all-numeric hostname presented in DNS to an IP address without asking >>>>>>>> anyone. >>>>>>>> So if those two bugs (or "archaic features") occur together, the >>>>>>>> result may be a successful resolution. >>>>>>>> >>>>>>>> No idea why it would occur more often on Android than on Windows, >>>>>>>> though. And my Linux boxes don't resolve 127.0.1 to anything. >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> On Thu, Aug 19, 2021 at 2:42 PM Yoav Weiss <yoav...@chromium.org> >>>>>>>> wrote: >>>>>>>> >>>>>>>>> Interesting! What happens then in the "successful resolution" case >>>>>>>>> Matt mentioned? >>>>>>>>> >>>>>>>>> On Thu, Aug 19, 2021 at 2:39 PM Harald Alvestrand <h...@google.com> >>>>>>>>> wrote: >>>>>>>>> >>>>>>>>>> Department of odd facts: >>>>>>>>>> >>>>>>>>>> - The ICANN rules for new TLDs forbid all top level domain names >>>>>>>>>> that start with a digit >>>>>>>>>> - The IDNA rules for bidirectional scripts forbid domain names >>>>>>>>>> that start with a digit (Unicode bidi afficandoes will know why) >>>>>>>>>> - The only real reason why leading digits aren't outlawed in >>>>>>>>>> domain names at the second level is 3com. >>>>>>>>>> >>>>>>>>>> It seems safe to say that no legitimate fully qualified hostname >>>>>>>>>> will ever have a last component consisting only of digits. >>>>>>>>>> That means the only time we could get a legitimate hostname is >>>>>>>>>> for something that has to be resolved via a search path. >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> On Thu, Aug 19, 2021 at 2:33 PM Yoav Weiss <yoav...@chromium.org> >>>>>>>>>> wrote: >>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> On Thu, Aug 19, 2021 at 2:28 PM Matt Menke <mme...@google.com> >>>>>>>>>>> wrote: >>>>>>>>>>> >>>>>>>>>>>> I created the title using Chrome Status's deprecation >>>>>>>>>>>> template, so any confusion should be blamed on that. >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> +Jason Robbins - on the title issues. >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> I used the "Draft Intent to Deprecate and Remove email" button, >>>>>>>>>>>> and assume I'd need to do a "Draft Intent to Ship email" before >>>>>>>>>>>> shipping to >>>>>>>>>>>> stable, after a 50% trial on prerelease channels. >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> There's no need for 2 emails for removals. We can discuss the >>>>>>>>>>> full deprecation, experimentation/trials and removal on stable here. >>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> On Thu, Aug 19, 2021 at 3:15 AM Yoav Weiss < >>>>>>>>>>>> yoav...@chromium.org> wrote: >>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:36 PM Matt Menke <mme...@google.com> >>>>>>>>>>>>> wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 5:23 PM Yoav Weiss < >>>>>>>>>>>>>> yoav...@chromium.org> wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:18 PM Matt Menke < >>>>>>>>>>>>>>> mme...@google.com> wrote: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 4:53 PM Yoav Weiss < >>>>>>>>>>>>>>>> yoav...@chromium.org> wrote: >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 8:47 PM 'Matt Menke' via blink-dev >>>>>>>>>>>>>>>>> <blin...@chromium.org> wrote: >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Contact emailsmme...@google.com >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> ExplainerNone >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Specificationhttps://url.spec.whatwg.org/ >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Summary >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses, but end >>>>>>>>>>>>>>>>>> in numbers are treated as valid, and looked up via DNS (e.g., >>>>>>>>>>>>>>>>>> http://foo.127.1/). Per the Public Suffix List spec, the >>>>>>>>>>>>>>>>>> eTLD+1 of the hostname in that URL should be "127.1". If >>>>>>>>>>>>>>>>>> that is ever fed >>>>>>>>>>>>>>>>>> back into a URLs, "http://127.1/ <http://127.0.0.1/>" is >>>>>>>>>>>>>>>>>> mapped to "http://127.0.0.1/" by the URL spec, which >>>>>>>>>>>>>>>>>> seems potentially dangerous. "127.0.0.0.1" could also >>>>>>>>>>>>>>>>>> potentially be used >>>>>>>>>>>>>>>>>> to confuse users. We want to reject URLs with these >>>>>>>>>>>>>>>>>> hostnames. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Blink componentInternals>Network>DNS >>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3EDNS> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Motivation >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses, but end >>>>>>>>>>>>>>>>>> in numbers are treated as valid hostnames, and looked up via >>>>>>>>>>>>>>>>>> DNS. Example >>>>>>>>>>>>>>>>>> hostnames: 127.0.0.0.1, foo.0.1, 10.0.0.09, 08.1.2.3. These >>>>>>>>>>>>>>>>>> can be >>>>>>>>>>>>>>>>>> problematic for the following reason: * " >>>>>>>>>>>>>>>>>> http://foo.127.1/" has an eTLD+1 of "127.1", per the >>>>>>>>>>>>>>>>>> public suffix list spec. If that's ever used as the hostname >>>>>>>>>>>>>>>>>> in a new URL, >>>>>>>>>>>>>>>>>> however, as in "http://127.1 <http://127.0.0.1/>", it >>>>>>>>>>>>>>>>>> will then get mapped to "http://127.0.0.1/", per the URL >>>>>>>>>>>>>>>>>> spec, which is a different host, which is not safe. * " >>>>>>>>>>>>>>>>>> http://127.0.0.0.1" and "http://1.2.3.09", both of which >>>>>>>>>>>>>>>>>> are looked up via DNS rather than failing or being treated >>>>>>>>>>>>>>>>>> as IPv4 >>>>>>>>>>>>>>>>>> hostnames, also seem potentially confusing. While no exploit >>>>>>>>>>>>>>>>>> is currently >>>>>>>>>>>>>>>>>> known here, we want to remove support for these as a >>>>>>>>>>>>>>>>>> preventative security >>>>>>>>>>>>>>>>>> measure. The URL spec has been updated so that any URL with >>>>>>>>>>>>>>>>>> a hostname >>>>>>>>>>>>>>>>>> ending in a number that's not an IPv4 address (including, >>>>>>>>>>>>>>>>>> e.g., >>>>>>>>>>>>>>>>>> http://foo.1./, but not http://foo.1../) is considered >>>>>>>>>>>>>>>>>> invalid. Since this is part of the URL spec, not the DNS >>>>>>>>>>>>>>>>>> spec, we want to >>>>>>>>>>>>>>>>>> reject these URLs are the GURL layer, for URLs with >>>>>>>>>>>>>>>>>> appropriate protocols >>>>>>>>>>>>>>>>>> (http, https, ws, wss, file). For consistency, we should >>>>>>>>>>>>>>>>>> also fail DNS >>>>>>>>>>>>>>>>>> lookup attempts of these sorts of hostnames. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Initial public proposal >>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619 >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> TAG reviewNot required for an Intent to Deprecate, I >>>>>>>>>>>>>>>>>> believe. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> TAG review statusNot applicable >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Risks >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Interoperability and Compatibility >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Any URL with an affected hostname will fail to load, and >>>>>>>>>>>>>>>>>> will need to be migrated to another hostname. URLs of this >>>>>>>>>>>>>>>>>> form do appear >>>>>>>>>>>>>>>>>> to be in use, though it's not clear under what >>>>>>>>>>>>>>>>>> circumstances. No entry in >>>>>>>>>>>>>>>>>> the public suffix list is affected. Affected URLs make up no >>>>>>>>>>>>>>>>>> more than >>>>>>>>>>>>>>>>>> 0.0003% of hostnames looked up via the host resolver on any >>>>>>>>>>>>>>>>>> platform, and >>>>>>>>>>>>>>>>>> are basically not used in any file URLs, according to our >>>>>>>>>>>>>>>>>> metrics. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Do we have reason to believe these hostnames are not >>>>>>>>>>>>>>>>> legitimate ones? >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Unfortunately, we have no insight into them - they could be >>>>>>>>>>>>>>>> mistyped URLs sent to typo squatting ISPs that OSX lets >>>>>>>>>>>>>>>> through but the >>>>>>>>>>>>>>>> Windows host resolver blocks, and various flavors of Linux >>>>>>>>>>>>>>>> treat >>>>>>>>>>>>>>>> differently. Or they could be mapped via a hosts file, or >>>>>>>>>>>>>>>> they could be >>>>>>>>>>>>>>>> hostnames that only resolve on public networks. Could be some >>>>>>>>>>>>>>>> network tool >>>>>>>>>>>>>>>> that uses them when installed locally, but is only available >>>>>>>>>>>>>>>> on certain >>>>>>>>>>>>>>>> platforms. No reason to think one possibility is more likely >>>>>>>>>>>>>>>> than the >>>>>>>>>>>>>>>> others. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Do we have UKM for them that would enable us to test a >>>>>>>>>>>>>>> random sample? >>>>>>>>>>>>>>> I'm concerned about blocking those hostnames if they are >>>>>>>>>>>>>>> legitimate, as that's something that a web developer can't do >>>>>>>>>>>>>>> anything >>>>>>>>>>>>>>> about. >>>>>>>>>>>>>>> So even if the number of hosts is small, I'd like to get >>>>>>>>>>>>>>> more certainty that they are *not* legitimate hosts before >>>>>>>>>>>>>>> blocking them. >>>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> We have UKM on their number (0.0003% of DNS lookups on OSX, >>>>>>>>>>>>>> less elsewhere - we can't meaningfully instrument percent of >>>>>>>>>>>>>> created GURLs), but we don't have their hostnames, what they >>>>>>>>>>>>>> resolve to, or >>>>>>>>>>>>>> know anything else about them, unfortunately. >>>>>>>>>>>>>> >>>>>>>>>>>>>> Navigation to a subset of these as frame URLs were broken at >>>>>>>>>>>>>> one point - I'm pretty sure the breakage even made it to stable: >>>>>>>>>>>>>> https://crbug.com/1173238. There were no reports of >>>>>>>>>>>>>> problems. Only non-IPv4 URLs where the last two components were >>>>>>>>>>>>>> broken, >>>>>>>>>>>>>> though, and it didn't affect subresources. On OSX and Android, >>>>>>>>>>>>>> over 99% of >>>>>>>>>>>>>> successfully resolved problematic hostnames fit into that >>>>>>>>>>>>>> bucket, though on >>>>>>>>>>>>>> Linux, only about 2% do. >>>>>>>>>>>>>> >>>>>>>>>>>>>> That doesn't give us any hard conclusions, except they're >>>>>>>>>>>>>> either not deliberate navigations on OSX/Android, or they're not >>>>>>>>>>>>>> navigations. >>>>>>>>>>>>>> >>>>>>>>>>>>> >>>>>>>>>>>>> :| >>>>>>>>>>>>> >>>>>>>>>>>>> One more question: Is this an intent to Prototype or an intent >>>>>>>>>>>>> to deprecate? The title is a bit unclear.. >>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> On OSX and Android, about 90% of host resolver lookups >>>>>>>>>>>>>>>>>> for these hostnames succeed, 60% do on Linux, and 2% on >>>>>>>>>>>>>>>>>> Windows and >>>>>>>>>>>>>>>>>> ChromeOS. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Do you know where those failures are coming from? >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Could be typos, could be the Windows and ChromeOS host >>>>>>>>>>>>>>>> resolvers don't let them through. Since we've had no filed >>>>>>>>>>>>>>>> bugs about >>>>>>>>>>>>>>>> them, I suspect the failures are not deliberate navigations or >>>>>>>>>>>>>>>> intended >>>>>>>>>>>>>>>> network requests. I'm much more interested in where the >>>>>>>>>>>>>>>> successes are >>>>>>>>>>>>>>>> coming from, myself. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> To allow for emergency disabling in case of wider than >>>>>>>>>>>>>>>>>> expected breakage, I intend to add a feature for it, and do >>>>>>>>>>>>>>>>>> a 50% field >>>>>>>>>>>>>>>>>> trial on pre-release channels, though plan to just enable >>>>>>>>>>>>>>>>>> the feature, >>>>>>>>>>>>>>>>>> rather than do a gradual rollout to stable, given the low >>>>>>>>>>>>>>>>>> usage. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Gecko: Positive ( >>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619#issuecomment-890826499 >>>>>>>>>>>>>>>>>> <https://www.chromestatus.com/admin/features/launch/5679790780579840/1?intent=1> >>>>>>>>>>>>>>>>>> ) >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Can you file an official position request? >>>>>>>>>>>>>>>>> https://bit.ly/blink-signals >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Done for Mozilla: >>>>>>>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/568 >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> Should I also do this for WebKit as well? They have in >>>>>>>>>>>>>>>> process CLs, so not sure if it's still needed. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> Agree that in-flight patches for WebKit are a sufficient >>>>>>>>>>>>>>> positive signal. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> WebKit: In development ( >>>>>>>>>>>>>>>>>> https://bugs.webkit.org/show_bug.cgi?id=228826) >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Web developers: No signals >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Activation >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> This breaks anything using one of these domains, and >>>>>>>>>>>>>>>>>> requires migrating to other hostnames. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Security >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> None >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Debuggability >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> These will act like any other invalid URL. Behavior is >>>>>>>>>>>>>>>>>> context dependent. Since this is logic deep within GURL, and >>>>>>>>>>>>>>>>>> GURLs are >>>>>>>>>>>>>>>>>> created in a great many places, console warnings >>>>>>>>>>>>>>>>>> specifically for this seem >>>>>>>>>>>>>>>>>> not practical. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md> >>>>>>>>>>>>>>>>>> ?No. Javascript URL construction is tested, but URLs >>>>>>>>>>>>>>>>>> are used in a great many other places, which don't have test >>>>>>>>>>>>>>>>>> coverage, since DNS lookups for these domains must succeed >>>>>>>>>>>>>>>>>> in the first >>>>>>>>>>>>>>>>>> place for the tests to be meaningful. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Flag name >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Requires code in //chrome?False >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Tracking bughttps://crbug.com/1237032 >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Estimated milestones >>>>>>>>>>>>>>>>>> DevTrial on desktop 95 >>>>>>>>>>>>>>>>>> DevTrial on Webview 95 >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>>>>>>>>>>>> https://www.chromestatus.com/feature/5679790780579840 >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> This intent message was generated by Chrome Platform >>>>>>>>>>>>>>>>>> Status <https://www.chromestatus.com/>. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> -- >>>>>>>>>>>>>>>>>> You received this message because you are subscribed to >>>>>>>>>>>>>>>>>> the Google Groups "blink-dev" group. >>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails >>>>>>>>>>>>>>>>>> from it, send an email to blink-dev+...@chromium.org. >>>>>>>>>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com >>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>>>>>>>>> . >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> -- >>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>> it, send an email to blink-dev+...@chromium.org. >>>>>>>>>>> To view this discussion on the web visit >>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com >>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>>> . >>>>>>>>>>> >>>>>>>>>> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvqcQ6p2%2B7bN83LwGQZmX1u9u-M%2B2ZiEEO47O88RM3O9QA%40mail.gmail.com.