> Is this the relevant explainer (referenced from the PR below):
https://github.com/WICG/sanitizer-api/blob/main/explainer.md

Yes, as far as I know.

> This seems positive, right?

Whoops, meant to put positive. I updated the chromestatus.

> Both of these look like "Shipped/Shipping", per
https://bit.ly/blink-signals. That status is a little odd, because it
doesn't look like they've actually made it to a stable release, but if I'm
reading the bug trackers right they're both merged, so they're past "In
Development".

Ok, I'll change them to shipped/shipping.

On Thu, Feb 15, 2024 at 9:35 AM Luke <lwar...@igalia.com> wrote:

> Just to keep everyone up to date, you can disregard my remarks above I've
> landed a patch which addresses the lack of trusted types protection, thanks
> for the quick review Joey.
>
> Regards,
> Luke
>
> On Wednesday, February 14, 2024 at 10:49:23 PM UTC Luke wrote:
>
>> Hi,
>>
>> In it's current form Chromium's implementation of these functions
>> bypasses trusted types protection.
>>
>> The below WPT tests cover this behaviour:
>>
>>
>> https://wpt.fyi/results/trusted-types/block-string-assignment-to-ShadowRoot-setHTMLUnsafe.html?label=experimental&label=master&aligned
>>
>> https://wpt.fyi/results/trusted-types/block-string-assignment-to-Element-setHTMLUnsafe.html?label=experimental&label=master&aligned
>>
>> https://wpt.fyi/results/trusted-types/block-string-assignment-to-Document-parseHTMLUnsafe.html?label=experimental&label=master&aligned
>>
>> This should be addressed before shipping, else it will be an unexpected
>> security regression.
>>
>> On Wednesday, February 14, 2024 at 10:23:01 PM UTC Vladimir Levin wrote:
>>
>>> On Wed, Feb 14, 2024 at 1:53 PM Jeffrey Yasskin <jyas...@chromium.org>
>>> wrote:
>>>
>>>> Non-API-owner opinions inline:
>>>>
>>>> On Wed, Feb 14, 2024 at 1:42 PM 'Vladimir Levin' via blink-dev <
>>>> blin...@chromium.org> wrote:
>>>>
>>>>> I just had some clarifying questions
>>>>>
>>>>> On Wed, Feb 14, 2024 at 1:13 PM Joey Arhar <jar...@chromium.org>
>>>>> wrote:
>>>>>
>>>>>> Some additional notes:
>>>>>> - This API is tested in the declarative ShadowDOM tests in
>>>>>> interop2024, and it is counting against us to not have it enabled by
>>>>>> default.
>>>>>> - The future sanitization options will be added as an optional second
>>>>>> parameter to both methods, so there will not be any compat issues with
>>>>>> shipping now.
>>>>>>
>>>>>> On Wed, Feb 14, 2024 at 1:11 PM Joey Arhar <jar...@chromium.org>
>>>>>> wrote:
>>>>>>
>>>>>>> Contact emailsjar...@chromium.org
>>>>>>>
>>>>>>> ExplainerNone
>>>>>>>
>>>>>>
>>>>> Is this the relevant explainer (referenced from the PR below):
>>>>> https://github.com/WICG/sanitizer-api/blob/main/explainer.md
>>>>>
>>>>>
>>>>>>
>>>>>>>
>>>>>>> Specification
>>>>>>> https://html.spec.whatwg.org/C/#unsafe-html-parsing-methods
>>>>>>> https://github.com/whatwg/html/pull/9538
>>>>>>>
>>>>>>> Summary
>>>>>>>
>>>>>>> The setHTMLUnsafe and parseHTMLUnsafe methods allow Declarative
>>>>>>> ShadowDOM to be used from javascript. In the future, they may also get 
>>>>>>> new
>>>>>>> parameters for sanitization.
>>>>>>>
>>>>>>>
>>>>>>> Blink componentBlink>HTML
>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EHTML>
>>>>>>>
>>>>>>> TAG reviewNone
>>>>>>>
>>>>>>> TAG review statusNot applicable
>>>>>>>
>>>>>>
>>>>> There seems to be consensus within browser vendors that this is a good
>>>>> idea, but I'm just wondering why you decided against filing TAG here?
>>>>>
>>>>
>>>> IMO, either Firefox or Safari folks should have filed a TAG review for
>>>> this before they merged their patches. Now that they've merged, I think it
>>>> falls into the "[already specified && already shipped]" exception
>>>> category
>>>> <https://www.chromium.org/blink/guidelines/api-owners/process-exceptions/>,
>>>> and it's probably too fixed to ask the TAG to spend time on it.
>>>>
>>>
>>> (also non-api-owner, but responding anyway): if that is in fact shipping
>>> then I agree that this should be the exception here, thanks.
>>>
>>>
>>>>
>>>>> Risks
>>>>>>>
>>>>>>>
>>>>>>> Interoperability and Compatibility
>>>>>>>
>>>>>>> None
>>>>>>>
>>>>>>>
>>>>>>> *Gecko*: No signal (
>>>>>>> https://bugzilla.mozilla.org/show_bug.cgi?id=1850675)
>>>>>>> https://github.com/whatwg/html/pull/9538#issuecomment-1728947778
>>>>>>>
>>>>>>
>>>>> This seems positive, right?
>>>>>
>>>>
>>>>
>>>>> *WebKit*: Positive (https://bugs.webkit.org/show_bug.cgi?id=261143)
>>>>>>>
>>>>>>
>>>>> I'm not sure how to read this properly, but is this a positive signal
>>>>> or "shipped/shipping" signal?
>>>>>
>>>>
>>>> Both of these look like "Shipped/Shipping", per
>>>> https://bit.ly/blink-signals. That status is a little odd, because it
>>>> doesn't look like they've actually made it to a stable release, but if I'm
>>>> reading the bug trackers right they're both merged, so they're past "In
>>>> Development".
>>>>
>>>
>>> Yeah, that's my thought here too. My understanding is that all of the
>>> patches here are merged, but I just wanted to double check in case I'm
>>> misunderstanding what those bugs are implying.
>>>
>>>
>>>>
>>>>
>>>>> *Web developers*: No signals
>>>>>>>
>>>>>>> *Other signals*:
>>>>>>>
>>>>>>> Ergonomics
>>>>>>>
>>>>>>> This API will likely be used in tandem with Declarative ShadowDOM.
>>>>>>> The default usage of this API will not make it hard for chrome to 
>>>>>>> maintain
>>>>>>> good performance.
>>>>>>>
>>>>>>>
>>>>>>> Activation
>>>>>>>
>>>>>>> It will not be challenging for developers to use this feature
>>>>>>> immediately.
>>>>>>>
>>>>>>>
>>>>>>> Security
>>>>>>>
>>>>>>> There are no security risks. This API just does declarative
>>>>>>> ShadowDOM. There is an "unsafe" in the name because there are future 
>>>>>>> plans
>>>>>>> to add sanitization options.
>>>>>>> https://github.com/WICG/sanitizer-api/issues/185
>>>>>>> https://github.com/whatwg/html/issues/8627
>>>>>>> https://github.com/whatwg/html/issues/8759
>>>>>>>
>>>>>>>
>>>>>>> WebView application risks
>>>>>>>
>>>>>>> Does this intent deprecate or change behavior of existing APIs, such
>>>>>>> that it has potentially high risk for Android WebView-based 
>>>>>>> applications?
>>>>>>>
>>>>>>> None
>>>>>>>
>>>>>>>
>>>>>>> Debuggability
>>>>>>>
>>>>>>> This API does not need any special DevTools features. You can call
>>>>>>> the method from the console panel.
>>>>>>>
>>>>>>>
>>>>>>> Will this feature be supported on all six Blink platforms (Windows,
>>>>>>> Mac, Linux, ChromeOS, Android, and Android WebView)?Yes
>>>>>>>
>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>>> ?Yes
>>>>>>>
>>>>>>> Flag name on chrome://flagsHTMLUnsafeMethods
>>>>>>>
>>>>>>> Finch feature nameHTMLUnsafeMethods
>>>>>>>
>>>>>>> Requires code in //chrome?False
>>>>>>>
>>>>>>> Estimated milestones
>>>>>>> DevTrial on desktop 120
>>>>>>> DevTrial on Android 120
>>>>>>>
>>>>>>> Anticipated spec changes
>>>>>>>
>>>>>>> Open questions about a feature may be a source of future web compat
>>>>>>> or interop issues. Please list open issues (e.g. links to known github
>>>>>>> issues in the project for the feature specification) whose resolution 
>>>>>>> may
>>>>>>> introduce web compat/interop risk (e.g., changing to naming or 
>>>>>>> structure of
>>>>>>> the API in a non-backward-compatible way).
>>>>>>> None
>>>>>>>
>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>> https://chromestatus.com/feature/6560361081995264
>>>>>>>
>>>>>>> This intent message was generated by Chrome Platform Status
>>>>>>> <https://chromestatus.com/>.
>>>>>>>
>>>>>> --
>>>>>> You received this message because you are subscribed to the Google
>>>>>> Groups "blink-dev" group.
>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>> send an email to blink-dev+...@chromium.org.
>>>>>> To view this discussion on the web visit
>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAK6btwJiEbhk_YGbVhuUg0emSJTfT%3D20_1bTDMFJxcH5i9tbMQ%40mail.gmail.com
>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAK6btwJiEbhk_YGbVhuUg0emSJTfT%3D20_1bTDMFJxcH5i9tbMQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>> .
>>>>>>
>>>>> --
>>>>> You received this message because you are subscribed to the Google
>>>>> Groups "blink-dev" group.
>>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>>> an email to blink-dev+...@chromium.org.
>>>>> To view this discussion on the web visit
>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADsXd2MH_fZddPf6c_QwhEP5JU767nEy1ck338Cx_HYFsytO4w%40mail.gmail.com
>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADsXd2MH_fZddPf6c_QwhEP5JU767nEy1ck338Cx_HYFsytO4w%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>> .
>>>>>
>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAK6btwJ3Sp6ShrbdFHiO50Pz7_D9QsY%3DQJDbN2v5efVfcFzrqg%40mail.gmail.com.

Reply via email to