Thanks for working with the community on these mechanisms that enable
easier COI adoption!

M92-M103 would mean the trial is running for ~10 months, which is
slightly longer than the typical OT. I'm inclined to say that as such, an
extension would require 3 LGTMs.

With that said, I don't think there's high risk here, as this is a
deprecation trial, and you're actively working with partners to rip the
band-aid off eventually.

*LGTM1*

On Mon, Sep 6, 2021 at 2:43 PM Lutz Vahl <v...@chromium.org> wrote:

> Contact emails
>
> v...@chromium.org bbu...@chromium.org cl...@chromium.org
>
> Explainer
>
>
> https://docs.google.com/document/d/1zDlfvfTJ_9e8Jdc8ehuV4zMEu9ySMCiTGMS9y0GU92k
>
> Specification
>
> https://tc39.github.io/ecma262/#sec-sharedarraybuffer-objects
>
> Design docs Including the new security requirements
>
>
> https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/SharedArrayBuffer
>
> Discussion how and what to gate
>
> https://github.com/whatwg/html/issues/4732
>
> Summary
>
> ‘SharedArrayBuffers’ (SABs) on desktop platforms are restricted to
> cross-origin isolated environments, matching the behavior we've recently
> shipped on Android and Firefox. We've performed that change in Chrome 92. A
> reverse OT was started to give developers the option to use SABs in case
> they are not able to adopt cross origin isolation yet.
>
> We’ve received lot’s of feedback that adopting COOP/COEP is hard (details
> below). Therefore I’m asking for your approval to extend the SAB reverse OT
> from M96 until M103 (branch point 2022-05-12) to give developers
> confidence that they'll have time to adopt these additional mechanisms as a
> means to deploy cross-origin isolation.
>
> Experimental timeline / plan for all new capabilities needed to replace
> the OT
>
> The SAB restriction in M92 went smoothly without any major issues in the
> wild because we offered the reverse OT. We’ve received lot’s of feedback
> that adopting COOP/COEP is hard and sometimes impossible (e.g. Steve’s
> message in this thread). Therefore the reverse OT is currently the only way
> to enable SABs for some sites. We do see ~6M DoD active usage of SABs in
> non COI contexts on UMA, chromestatus is showing ~0.36%
> <https://chromestatus.com/metrics/feature/popularity#V8SharedArrayBufferConstructedWithoutIsolation>
> .
>
> To overcome this limitation and make adoption possible, we’re working on 
> multiple
> solutions
> <https://github.com/camillelamy/explainers/blob/main/cross-origin-isolation-deployment.md>
> :
>
>
>    1.
>
>    COEP:credentialless <https://github.com/WICG/credentiallessness> -
>    https://crbug.com/1218896
>
> COEP:credentialless causes no-cors cross-origin requests not to include
>
> credentials (cookies, client certificates, etc...). Similarly to
> require-corp, it can be used to enable cross-origin-isolation. Some
> developers are blocked on a set of dependencies which don't yet assert that
> they're safe to embed in cross-origin isolated environments.
>
> We're working on a `credentialless` COEP mode which is currently in OT
> that will allow developers to work around this constraint. Based on
> positive developer feedback we expect to send an I2S in the near future and
> are hopeful that we can ship this mechanism in the M96
>
>
>    1.
>
>    COOP same-origin-allow-popups-plus-coep
>    <https://github.com/camillelamy/explainers/blob/main/coi-with-popups.md>
>
> To allow crossOriginIsolated pages to use popup-based OAuth/payment flows,
> we plan to have COOP same-origin-allow-popups enable crossOriginIsolation
> when used in conjunction with COEP. Developers who depend on popups to 3P
> for e.g. identity or payment flows can’t currently deploy
> cross-origin-isolation.
>
> Spec work is ongoing and we’re targeting EoY 2021 to have a prototype and
> start the OT in Q1 2022. As soon as the spec is defined, we’ll kick off the
> intent process. Without this all sites need to migrate to WebID and
> WebPayment for their flows to be able to use SABs.
>
>
>
>    1.
>
>    Anonymous iframes
>    <https://github.com/camillelamy/explainers/blob/main/anonymous_iframes.md>
>
> Anonymous iframes are a generalization of COEP credentialless to support
> 3rd party iframes that may not deploy COEP. Like with COEP credentialless,
> we replace the opt-in of cross-origin subresources by avoiding to load
> non-public resources. This will remove the constraint and will unblock
> developers to adopt cross-origin-isolation as soon as they’re embedding 3P
> iframes.
>
> This work is even further down the road as we’re currently blocked by the
> ongoing pre-partitioning work (Storage partitioning and CHIPs to be code
> complete), which is needed to safely ship Anonymous iframes. The current
> plan is to start an OT in Q2 2022.
>
> We’re currently investigating to limit Anonymous iframes to sandboxed
> iframes in the first place to overcome the partitioning dependency and
> start a OT earlier, but this will not unblock COI adoption for all iframes.
>
> Blink component
>
> Blink>JavaScript
> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EJavaScript>
>
> Search tags
>
> SharedArrayBuffer
> <https://chromestatus.com/features#tags:SharedArrayBuffer>, SAB
> <https://chromestatus.com/features#tags:SAB>
>
> TAG reviewhttps://github.com/w3ctag/design-reviews/issues/471
> TAG review statusClosed
> RisksInteroperability and Compatibility
>
> We expect this change to negatively impact developers using
> `SharedArrayBuffer` today. Chrome was the only platform where SABs have
> been available without COOP/COEP. Therefore we need to gice developers the
> right capabilities and a clear path forward to ensure they’ve enough time
> to adopt. We aim to mitigate these risks by adopting a longer-than-usual
> depreciation period with console warnings/issues and a reverse origin
> trial.
>
> Good news is, that other browsers have or are shipping SABs again gated
> behind COOP/COEP.
>
> Gecko: Shipped/Shipping (
> https://bugzilla.mozilla.org/show_bug.cgi?id=1312446)
>
> WebKit: Added COOP/COEP support in the lates preview
> <https://webkit.org/blog/11962/release-notes-for-safari-technology-preview-131/>.
> SAB support landed <https://bugs.webkit.org/show_bug.cgi?id=229559>
> recently gated behind COOP/COEP
>
> Will this feature be supported on all six Blink platforms (Windows, Mac,
> Linux, Chrome OS, Android, and Android WebView)?
>
> No - This OT is only for desktop, as this was the only platform where SABs
> have been available without COOP/COEP.
>
> Android re-enabled SABs gated behind COOP/COEP:
> https://chromestatus.com/feature/5171863141482496
>
> Tracking bug
>
> https://bugs.chromium.org/p/chromium/issues/detail?id=1144104
>
> Launch bug
>
> https://bugs.chromium.org/p/chromium/issues/detail?id=1138860
>
> Blink-dev Thread
>
> Planning isolation requirements (COOP/COEP) for SharedArrayBuffer
> <https://groups.google.com/a/chromium.org/g/blink-dev/c/_0MEXs6TJhg/m/QzWOGv7pAQAJ>
>
> I2S
> <https://groups.google.com/a/chromium.org/g/blink-dev/c/1NKvbIj3dq4/m/nLcgUst-BQAJ>
>
> Link to entry on the Chrome Platform Status
>
> https://chromestatus.com/feature/4570991992766464
>
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBP8_9eWFWYhA2_N_o-1E_xZRqDEh3kZgmZu9YXeX6ajEA%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBP8_9eWFWYhA2_N_o-1E_xZRqDEh3kZgmZu9YXeX6ajEA%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfVJ_L9vsQ%3DcBSiNrkjxyVOwnAQ9j9dHhLwy_OX2ybvQ7A%40mail.gmail.com.

Reply via email to