Hi all,
we've experienced some issues that lead us to disable these feature
through Normandy and will result in us enabling this only for
"EARLY_BETA_OR_EARLIER".
We will keep the list updated once we have a plan and a timeline.
Thanks,
Freddy
On 15.12.21 17:54, Niklas Gögge wrote:
Hi, everyone!
Here is a quick update to clear up the uncertainty and confusion.
In the past two weeks we have taken a look at the SameSite cookie WPTs
that Firefox was failing, investigated the breakages that were reported
to us and also had QA testing done to ensure there are no breakages on
any major sites.
With renewed confidence, we have reached the conclusion that we will
still ship in Firefox 96.
- Niklas
On Tuesday, November 30, 2021 at 8:24:13 PM UTC+1 Dragana Damjanovic wrote:
Hi,
I would prefer that all breakages reported so far are resolved or
otherwise explained before this hits the late Beta. Some of these
bugs were reported as late as last month.
Can we have a checkpoint before this hits the late Beta? An internal
email would be enough.
Please close bugs that are not reproducible or write a comment that
explains your investigation. I would expect that all breakage bugs
are closed before shipping.
dragana
On Tue, Nov 30, 2021 at 6:47 PM Niklas Gögge <[email protected]
<mailto:[email protected]>> wrote:
Hi Dragana and Valentin, We are fairly confident that we won't
face major breakages when released given that: - We have had
these features enabled on Nightly for over a year. - We will
have them on Beta soon. - Google Chrome has shipped them over a
year ago. That being said, there can of course still be bugs and
we have been going through the breakages listed in
https://bugzilla.mozilla.org/show_bug.cgi?id=1618610
<https://bugzilla.mozilla.org/show_bug.cgi?id=1618610>. So far
all the breakages we got to were no longer reproducible and we
will continue to verify the rest. Thanks for pointing out the
WPT failures, we will make sure to investigate those. Should we
get a significant amount of breakage reports in Beta we will
delay the shipping.
On Tuesday, November 30, 2021 at 3:34:28 PM UTC+1
[email protected] <mailto:[email protected]> wrote:
There are also a number of sameSite web platform tests that
are currently marked as failing.
Before shipping this we should at least try to fix those
which pass in other browsers.
https://wpt.fyi/results/cookies?label=experimental&label=master&aligned
<https://wpt.fyi/results/cookies?label=experimental&label=master&aligned>
On Tue, 30 Nov 2021 at 15:28, Dragana Damjanovic
<[email protected] <mailto:[email protected]>>
wrote:
Hi,
I have a question about the bugs linked to:
https://bugzilla.mozilla.org/show_bug.cgi?id=1618610
<https://bugzilla.mozilla.org/show_bug.cgi?id=1618610>
and also
https://bugzilla.mozilla.org/show_bug.cgi?id=1651119
<https://bugzilla.mozilla.org/show_bug.cgi?id=1651119>
There are some webcompat issues linked as well.
Are we confident that these issues are fixed?Can we
close them? I would prefer a comment in them saying what
is the status, or do we have a doc that analyzes these
issues?
Do these issues reproduce in Chrome or are they Firefox
specific? In the latter case that would be a bug in our
code.
dragana
On Tue, Nov 30, 2021 at 1:45 PM Niklas Gögge
<[email protected] <mailto:[email protected]>> wrote:
As of Firefox 96 we intend to ship “SameSite=Lax by
default”, “SameSite=None only if secure” and
“Schemeful SameSite” on all platforms. These
features have been developed behind the following
preferences: “network.cookie.sameSite.laxByDefault”,
“network.cookie.sameSite.noneRequiresSecure”, and
“network.cookie.sameSite.schemeful”.
Link to the proposal:
https://datatracker.ietf.org/doc/html/draft-west-cookie-incrementalism-01
<https://datatracker.ietf.org/doc/html/draft-west-cookie-incrementalism-01>
Summary:
"1. Treat the lack of an explicit "SameSite"
attribute as
"SameSite=Lax". That is, the "Set-Cookie"
value "key=value" will
produce a cookie equivalent to "key=value;
SameSite=Lax".
Cookies that require cross-site delivery can
explicitly opt-into
such behavior by asserting "SameSite=None"
when creating a
cookie.
2. Require the "Secure" attribute to be set for
any cookie which
asserts "SameSite=None" (similar
conceptually to the behavior for
the "__Secure-" prefix). That is, the
"Set-Cookie" value
"key=value; SameSite=None; Secure" will be
accepted, while
"key=value; SameSite=None" will be rejected.
3. Require both the scheme and registrable
domain of a request's
client's "site for cookies" to match the
target URL when deciding
whether a given request is considered
same-site. That is, a
request initiated from "http://site.example
<http://site.example>" to
"https://site.example
<https://site.example>" should be considered
cross-site."
Google Chrome has already shipped these features.
Bug to turn on by default:
https://bugzilla.mozilla.org/show_bug.cgi?id=1617609
<https://bugzilla.mozilla.org/show_bug.cgi?id=1617609>
SameSite MDN Docs:
https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite
<https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Set-Cookie/SameSite>
web-platform-tests:
https://github.com/web-platform-tests/wpt/tree/master/cookies/samesite-none-secure
<https://github.com/web-platform-tests/wpt/tree/master/cookies/samesite-none-secure>
https://github.com/web-platform-tests/wpt/tree/master/cookies/schemeful-same-site
<https://github.com/web-platform-tests/wpt/tree/master/cookies/schemeful-same-site>
https://github.com/web-platform-tests/wpt/tree/master/cookies/samesite
<https://github.com/web-platform-tests/wpt/tree/master/cookies/samesite>
--
You received this message because you are subscribed
to the Google Groups "[email protected]
<mailto:[email protected]>" group.
To unsubscribe from this group and stop receiving
emails from it, send an email to
[email protected]
<mailto:[email protected]>.
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/454e63d5-17fb-45d6-a0d2-ab277d049de3n%40mozilla.org
<https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/454e63d5-17fb-45d6-a0d2-ab277d049de3n%40mozilla.org?utm_medium=email&utm_source=footer>.
--
You received this message because you are subscribed to
the Google Groups "[email protected]
<mailto:[email protected]>" group.
To unsubscribe from this group and stop receiving emails
from it, send an email to
[email protected]
<mailto:[email protected]>.
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/CACOB9hDHfAEj%3DpziqMmSK9GPzOwbsBb0yMLXEZ_OoGJdk1LayA%40mail.gmail.com
<https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/CACOB9hDHfAEj%3DpziqMmSK9GPzOwbsBb0yMLXEZ_OoGJdk1LayA%40mail.gmail.com?utm_medium=email&utm_source=footer>.
--
You received this message because you are subscribed to the Google
Groups "[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send
an email to [email protected]
<mailto:[email protected]>.
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/9d382272-cecb-4cb3-b02f-f442c1dc32f4n%40mozilla.org
<https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/9d382272-cecb-4cb3-b02f-f442c1dc32f4n%40mozilla.org?utm_medium=email&utm_source=footer>.
--
You received this message because you are subscribed to the Google Groups
"[email protected]" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion on the web visit
https://groups.google.com/a/mozilla.org/d/msgid/dev-platform/18574068-1b05-21fc-14df-4834219baf49%40mozilla.com.