LGTM3 On Wed, Aug 6, 2025 at 8:06 AM Yoav Weiss (@Shopify) <yoavwe...@chromium.org> wrote:
> LGTM2 > > On Wednesday, August 6, 2025 at 5:06:29 PM UTC+2 Mike Taylor wrote: > >> LGTM1 (sorry for the delay) >> On 5/19/25 2:00 p.m., Chris Fredrickson wrote: >> >> Following up on this: >> >> Now that the new UseCounter >> <https://chromestatus.com/metrics/feature/timeline/popularity/5459> has >> made it out to Stable, the portion of pageloads that would be affected by >> this change is 0.000069%. >> >> The UseCounter >> <https://chromestatus.com/metrics/feature/timeline/popularity/3311> for >> `document.requestStorageAccess()` is currently at 0.075%. Same-site >> cross-origin SAA usage is a strict subset of this, which means 0.00092% of >> SAA usage would be affected in Chrome. >> >> Please LMK if those numbers look acceptable to you. >> On Friday, March 28, 2025 at 4:27:37 PM UTC-4 Chris Fredrickson wrote: >> >>> Thanks Alex (and Vlad), those concerns make sense. >>> >>> Re: next steps, I've improved <https://crrev.com/c/6373548> the >>> existing UMA, but more importantly, I added >>> <https://crrev.com/c/6397807> a UKM-based UseCounter that will >>> precisely measure the % of pageloads that would be affected by this change. >>> I will follow up once I have data from Stable (M136) from that, and know >>> which sites are most likely to experience breakage. >>> >>> I'm reluctant to do a finch'd rollout for this, since this change >>> affects web platform semantics; a finch rollout for this would make it very >>> hard for web developers to predict the user agent's behavior, IMO. So the >>> other options (improving metrics, including UKM to identify affected sites) >>> seem like the better option to me. >>> >>> Talk to you in a month or two (I hope), >>> Chris >>> >>> On Wednesday, March 26, 2025 at 11:27:05 AM UTC-4 Alex Russell wrote: >>> >>>> Thanks, Chris. >>>> >>>> We discussed briefly at today's API OWNERs, and Vlad and I are in the >>>> same boat (I think?), which is that we're glad that you were able to >>>> confirm our understanding of the situation, but the risk continues to look >>>> high in that light. >>>> >>>> There's generally a menu of options in these cases, ranging from adding >>>> more detailed metrics and waiting for analysis to roll in (which can take >>>> months), to working with developers and partners to characterise the >>>> potential for breakage, to spot checks of known-affected sites (or adding >>>> UKM to detect them), to finch'd rollout. We'd like to understand if any of >>>> these make sense for this case to reduce the risk profile here. >>>> >>>> WDYT? >>>> >>>> Best, >>>> >>>> Alex >>>> >>>> On Friday, March 21, 2025 at 12:39:14 PM UTC-7 Chris Fredrickson wrote: >>>> >>>>> Mozilla standards position request: >>>>> https://github.com/mozilla/standards-positions/issues/1200 >>>>> WebKit standards position request: >>>>> https://github.com/WebKit/standards-positions/issues/476 >>>>> >>>>> On Wednesday, March 19, 2025 at 4:40:17 PM UTC-4 Chris Fredrickson >>>>> wrote: >>>>> >>>>>> Sorry for the delay, for some reason Alex's message didn't show up in >>>>>> my inbox! >>>>>> >>>>>> *Alex*: >>>>>> Up to 100% of Storage Access API (SAA) usage could be affected, if we >>>>>> assume that *every *usage of SAA later involves a cross-origin, >>>>>> same-site network request that is required to be credentialed. >>>>>> >>>>>> However, it's also possible that *none* of the network traffic in >>>>>> the cross-origin, same-site bucket actually needs to be credentialed, so >>>>>> the breakage is *somewhere* between 0% and 100% of SAA usage... >>>>>> which is not very helpful. It's impossible for the browser to measure >>>>>> more >>>>>> specifically (other than checking the credentials mode), since the >>>>>> browser >>>>>> can't tell that cookies are required to be present on a given request. >>>>>> >>>>>> While writing this I realized that the browser *does *know the >>>>>> request's credentials mode, so the breakage estimate can at least exclude >>>>>> the portion of requests that opt out of cookies entirely. I'll update the >>>>>> metric accordingly; I expect this will reduce the 9% figure a bit. >>>>>> >>>>>> *Vlad*: >>>>>> Not exactly, the upper bound of breakage is 0.08% of pageloads (under >>>>>> the same assumptions as above). In practice I expect the real figure to >>>>>> be >>>>>> much lower, as not every such iframe will issue a cross-origin, same-site >>>>>> request; and of those that do, probably not all of those requests >>>>>> actually >>>>>> need to be credentialed. >>>>>> >>>>>> The 9% figure is the proportion of network traffic that could be >>>>>> affected from iframes that have called SAA. E.g., if we assume that every >>>>>> iframe that calls SAA then sends 11 network requests (and one of them is >>>>>> cross-origin same-site), then about 9% of that traffic falls into the >>>>>> bucket that's changing in this launch. As that example illustrates, it's >>>>>> possible that *all* of the 0.08% of pageloads that use SAA are >>>>>> affected by this launch; it's also possible that only a small fraction >>>>>> are >>>>>> affected. >>>>>> >>>>>> Re: nature of the breakage, the cross-origin same-site subset of >>>>>> network requests would no longer carry cross-site cookies from an iframe >>>>>> that has called `document.requestStorageAccess()`, by default. The real >>>>>> consequences of that could be anything from a completely broken >>>>>> experience, >>>>>> to unnoticeable; but since sites use cookies in such a variety of ways, >>>>>> it's kind of impossible to predict where on that spectrum this will fall. >>>>>> >>>>>> Re: vendor signals, yes, I'll do that. >>>>>> >>>>>> On Wednesday, March 19, 2025 at 11:23:28 AM UTC-4 Vladimir Levin >>>>>> wrote: >>>>>> >>>>>>> Is it a correct reading that that it's roughly 9% of 0.08% of >>>>>>> pageloads that will be affected? That still seems large. Can you speak >>>>>>> to >>>>>>> the nature of the breakage? Specifically, do the sites that currently >>>>>>> use >>>>>>> it become unusable or is it a milder change from that? >>>>>>> >>>>>>> On the process side, do you mind filing vendor signals (Gecko and >>>>>>> Webkit) for this? >>>>>>> >>>>>>> Thanks, >>>>>>> Vlad >>>>>>> >>>>>>> On Monday, March 17, 2025 at 2:28:23 PM UTC-4 Alex Russell wrote: >>>>>>> >>>>>>>> Hey Chris, >>>>>>>> >>>>>>>> Do you have a sense for what fraction of Storage Access API use >>>>>>>> (yes, I know it's low) will be impacted by this change? Is there a way >>>>>>>> to >>>>>>>> tell? >>>>>>>> >>>>>>>> Best, >>>>>>>> >>>>>>>> Alex >>>>>>>> >>>>>>>> On Wednesday, March 12, 2025 at 9:04:37 AM UTC-7 Chris Fredrickson >>>>>>>> wrote: >>>>>>>> >>>>>>>>> Contact emails >>>>>>>>> >>>>>>>>> cfred...@chromium.org >>>>>>>>> >>>>>>>>> Explainer >>>>>>>>> >>>>>>>>> None >>>>>>>>> >>>>>>>>> Specification >>>>>>>>> >>>>>>>>> https://github.com/privacycg/storage-access/pull/213 >>>>>>>>> >>>>>>>>> Summary >>>>>>>>> >>>>>>>>> Adjusts the Storage Access API semantics to strictly follow the >>>>>>>>> Same Origin Policy, w.r.t. security. I.e., using >>>>>>>>> document.requestStorageAccess() in a frame only attaches cookies to >>>>>>>>> requests to the iframe's origin (not site) by default. >>>>>>>>> >>>>>>>>> Note: the CookiesAllowedForUrls enterprise policy and/or Storage >>>>>>>>> Access Headers may still be used to unblock cross-site cookies. >>>>>>>>> >>>>>>>>> >>>>>>>>> Blink component >>>>>>>>> >>>>>>>>> Blink>StorageAccessAPI >>>>>>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EStorageAccessAPI%22> >>>>>>>>> >>>>>>>>> TAG review >>>>>>>>> >>>>>>>>> Not requested since this is a small change to the existing Storage >>>>>>>>> Access proposal that improves security and has no impact on privacy >>>>>>>>> or user >>>>>>>>> experience. >>>>>>>>> >>>>>>>>> TAG review status >>>>>>>>> >>>>>>>>> N/A >>>>>>>>> >>>>>>>>> Risks >>>>>>>>> >>>>>>>>> Interoperability and Compatibility >>>>>>>>> >>>>>>>>> The Storage Access API specification is imprecise about its >>>>>>>>> integration with Fetch, and does not define whether same-site, >>>>>>>>> cross-origin >>>>>>>>> requests ought to be credentialed after an iframe has used the Storage >>>>>>>>> Access API. >>>>>>>>> >>>>>>>>> Chrome and Firefox both currently include cookies on these >>>>>>>>> same-site cross-origin requests, so there is some risk to making their >>>>>>>>> behaviors diverge. We have discussed this with other browser vendors >>>>>>>>> and >>>>>>>>> they expressed that they were not concerned with Chrome making this >>>>>>>>> change. >>>>>>>>> >>>>>>>>> However, the Storage Access API currently has very little usage in >>>>>>>>> Chrome (0.08% of pageloads). The cross-origin, same-site subset of >>>>>>>>> usage is >>>>>>>>> an even smaller portion (9% of network requests from affected >>>>>>>>> pageloads). >>>>>>>>> So, the impact of breakage is small regardless. >>>>>>>>> >>>>>>>>> Sites that are broken by this can fix themselves using the >>>>>>>>> recently-shipped Storage Access Headers >>>>>>>>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/gERgwZfN_-E/m/QIJbT1zUCgAJ> >>>>>>>>> feature. >>>>>>>>> >>>>>>>>> >>>>>>>>> Gecko: No signal >>>>>>>>> >>>>>>>>> WebKit: No signal >>>>>>>>> >>>>>>>>> Web developers: Positive ( >>>>>>>>> https://github.com/privacycg/storage-access/issues/210#issuecomment-2527687508 >>>>>>>>> ) >>>>>>>>> >>>>>>>>> Other signals: >>>>>>>>> >>>>>>>>> WebView application risks >>>>>>>>> >>>>>>>>> Does this intent deprecate or change behavior of existing APIs, >>>>>>>>> such that it has potentially high risk for Android WebView-based >>>>>>>>> applications? >>>>>>>>> >>>>>>>>> None >>>>>>>>> >>>>>>>>> >>>>>>>>> Debuggability >>>>>>>>> >>>>>>>>> Cookies (and the reasons why they are included/excluded) are >>>>>>>>> debuggable via the Network panel in Chrome DevTools. >>>>>>>>> >>>>>>>>> >>>>>>>>> Will this feature be supported on all six Blink platforms >>>>>>>>> (Windows, Mac, Linux, ChromeOS, Android, and Android WebView)? >>>>>>>>> >>>>>>>>> Yes >>>>>>>>> >>>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>>>> ? >>>>>>>>> >>>>>>>>> Yes >>>>>>>>> >>>>>>>>> >>>>>>>>> https://wpt.fyi/results/storage-access-api/requestStorageAccess-cross-origin-fetch.sub.https.tentative.window.html >>>>>>>>> >>>>>>>>> >>>>>>>>> Flag name on about://flags >>>>>>>>> >>>>>>>>> storage-access-api-follows-same-origin-policy >>>>>>>>> >>>>>>>>> Finch feature name >>>>>>>>> >>>>>>>>> StorageAccessApiFollowsSameOriginPolicy >>>>>>>>> >>>>>>>>> Requires code in //chrome? >>>>>>>>> >>>>>>>>> False >>>>>>>>> >>>>>>>>> Tracking bug >>>>>>>>> >>>>>>>>> https://crbug.com/379030052 >>>>>>>>> >>>>>>>>> Estimated milestones >>>>>>>>> >>>>>>>>> 136 >>>>>>>>> >>>>>>>>> >>>>>>>>> Anticipated spec changes >>>>>>>>> >>>>>>>>> None anticipated. >>>>>>>>> >>>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>>> >>>>>>>>> >>>>>>>>> https://chromestatus.com/feature/5169937372676096?gate=5134161335287808 >>>>>>>>> >>>>>>>>> This intent message was generated by Chrome Platform Status >>>>>>>>> <https://chromestatus.com/>. >>>>>>>>> >>>>>>>>> -- >> You received this message because you are subscribed to the Google Groups >> "blink-dev" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to blink-dev+unsubscr...@chromium.org. >> To view this discussion visit >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/8344a1ee-3466-47e0-a447-b17924af0c7an%40chromium.org >> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/8344a1ee-3466-47e0-a447-b17924af0c7an%40chromium.org?utm_medium=email&utm_source=footer> >> . >> >> -- > You received this message because you are subscribed to the Google Groups > "blink-dev" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to blink-dev+unsubscr...@chromium.org. > To view this discussion visit > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/cfece196-9d6c-43db-8d83-973cc33eedefn%40chromium.org > <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/cfece196-9d6c-43db-8d83-973cc33eedefn%40chromium.org?utm_medium=email&utm_source=footer> > . > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw8hgUug3iAH1A%2BTyr6AxJr4Eo8KydHm1_Anrh4O6%3DTzLw%40mail.gmail.com.