Thanks for the feedback, Yoav. Sure, I'll kick off a new thread asap.

On Mon, Sep 6, 2021 at 1:58 PM Yoav Weiss <[email protected]> wrote:

> I appreciate y'all working with the community based on their feedback, and
> coming up with APIs that will enable folks to migrate to COI. Given that,
> it's understandable that designing, specifying, shipping and getting
> adoption of these APIs requires time.
>
> Can you send an intent to extend the deprecation trial? That would enable
> us to keep track of it. I also suspect that since M92-M103 is a bit on the
> longer side, it may require 3 LGTMs.
>
> On Mon, Sep 6, 2021 at 11:46 AM Lutz Vahl <[email protected]> wrote:
>
>> Hi API Owners,
>>
>> This is an update on the current status and the plan forward.
>>
>> The SAB restriction in M92 went smoothly without any major issues in the
>> wild because we offered the reverse OT. We’ve received lot’s of feedback
>> that adopting COOP/COEP is hard and sometimes impossible (e.g. Steve’s
>> message in this thread). Therefore the reverse OT is currently the only way
>> to enable SABs for some sites. We do see ~6M DoD active usage of SABs in
>> non COI contexts on UMA, chromestatus is showing ~0.36%
>> <https://chromestatus.com/metrics/feature/popularity#V8SharedArrayBufferConstructedWithoutIsolation>
>> .
>>
>> To overcome this limitation and make adoption possible, we’re working on 
>> multiple
>> solutions
>> <https://github.com/camillelamy/explainers/blob/main/cross-origin-isolation-deployment.md>
>> :
>>
>>
>>    1.
>>
>>    COEP:credentialless <https://github.com/WICG/credentiallessness> -
>>    https://crbug.com/1218896
>>
>> COEP:credentialless causes no-cors cross-origin requests not to include
>>
>> credentials (cookies, client certificates, etc...). Similarly to
>> require-corp, it can be used to enable cross-origin-isolation. Some
>> developers are blocked on a set of dependencies which don't yet assert that
>> they're safe to embed in cross-origin isolated environments.
>>
>> We're working on a `credentialless` COEP mode which is currently in OT
>> that will allow developers to work around this constraint. Based on
>> positive developer feedback we expect to send an I2S in the near future and
>> are hopeful that we can ship this mechanism in the M96
>>
>>
>>    1.
>>
>>    COOP same-origin-allow-popups-plus-coep
>>    <https://github.com/camillelamy/explainers/blob/main/coi-with-popups.md>
>>
>> To allow crossOriginIsolated pages to use popup-based OAuth/payment
>> flows, we plan to have COOP same-origin-allow-popups enable
>> crossOriginIsolation when used in conjunction with COEP. Developers who
>> depend on popups to 3P for e.g. identity or payment flows can’t currently
>> deploy cross-origin-isolation.
>>
>> Spec work is ongoing and we’re targeting EoY 2021 to have a prototype and
>> start the OT in Q1 2022. As soon as the spec is defined, we’ll kick off the
>> intent process. Without this all sites need to migrate to WebID and
>> WebPayment for their flows to be able to use SABs.
>>
>>
>>
>>    1.
>>
>>    Anonymous iframes
>>    <https://github.com/camillelamy/explainers/blob/main/anonymous_iframes.md>
>>
>> Anonymous iframes are a generalization of COEP credentialless to support
>> 3rd party iframes that may not deploy COEP. Like with COEP credentialless,
>> we replace the opt-in of cross-origin subresources by avoiding to load
>> non-public resources. This will remove the constraint and will unblock
>> developers to adopt cross-origin-isolation as soon as they’re embedding 3P
>> iframes.
>>
>> This work is even further down the road as we’re currently blocked by the
>> ongoing pre-partitioning work (Storage partitioning and CHIPs to be code
>> complete), which is needed to safely ship Anonymous iframes. The current
>> plan is to start an OT in Q2 2022.
>>
>> We’re currently investigating to limit Anonymous iframes to sandboxed
>> iframes in the first place to overcome the partitioning dependency and
>> start a OT earlier, but this will not unblock COI adoption for all iframes.
>>
>>
>> Therefore I’m asking for your* approval to extend the SAB reverse OT
>> from M96 until M103* (branch point 2022-05-12) to give developers
>> confidence that they'll have time to adopt these additional mechanisms as a
>> means to deploy cross-origin isolation.
>>
>>
>> Cheers,
>>
>>  Lutz
>>
>>
>> On Tue, Aug 31, 2021 at 3:50 PM Lutz Vahl <[email protected]> wrote:
>>
>>> Hi Steve,
>>>
>>> Thanks for letting us know! We're aware that COEP adoption is sometimes
>>> blocked by 3P content and are working on credentialess and anonymous
>>> iframes
>>> <https://github.com/camillelamy/explainers/blob/master/anonymous_iframes.md>
>>>  to
>>> unblock this.
>>> Feel free to submit credentials feedback
>>> <https://developer.chrome.com/origintrials/#/view_trial/3036552048754556929>
>>>  letting
>>> us know more details about your issues.
>>>
>>> The plan is that the SAB reverse OT will be in place as long as the COEP
>>> adoption is blocked as this is for now the only solution to be able to use
>>> SAB in such cases.
>>>
>>> @API Owners: I'll ping this thread again later this week as soon as the
>>> anonymous iframe launch plan is finalized asking for an SAB reverse OT
>>> extension.
>>>
>>>
>>> On Tue, Aug 31, 2021 at 2:41 PM Steve Hoek <[email protected]> wrote:
>>>
>>>> Hi... great work on this restriction for SABs.   Is there any
>>>> possibility that the OT will be extended past M96?
>>>>
>>>> Unfortunately, due to the way our solution (an interior design tool
>>>> with 3D rendering) is provided to third party OEMs (eg: IKEA, Home Depot),
>>>> we have had to resort to using the OT for now as we work through the issues
>>>> we uncovered with adding full CORP support to all of our subdomains and the
>>>> subdomains of our OEM customers (which is where it is most challenging for
>>>> us since these third parties don't want to add CORP to their resources,
>>>> understandably).
>>>>
>>>> We are tracking the new "credentialess" feature to enable us to fully
>>>> CORP isolate the first and third party content on our site, but it is not
>>>> ready yet and we cannot have the OT end before it is.
>>>>
>>>> Thoughts?
>>>>
>>>>
>>>> On Thursday, May 6, 2021 at 11:23:19 AM UTC-4 Chris Harrelson wrote:
>>>>
>>>>> Sounds ok to me, thanks for updating the thread.
>>>>>
>>>>> On Thu, May 6, 2021 at 2:56 AM Lutz Vahl <[email protected]> wrote:
>>>>>
>>>>>> Hi fellow API owners,
>>>>>>
>>>>>> Unfortunately we’ve received last minute feedback from developers
>>>>>> that there are limitations and issues using the provided reverse origin
>>>>>> trial (https://crbug.com/1204271 & https://crbug.com/1201589).
>>>>>> One of our goals for this migration is a smooth transition, therefore
>>>>>> we’ve decided to adjust the timeline of this change and will support the
>>>>>> reverse origin trial via <meta> tag as well.
>>>>>>
>>>>>> The usage of SharedArrayBuffers in none cross-origin isolated sites
>>>>>> will be restricted in *M92* - one milestone later as requested
>>>>>> earlier. In case sites already registered for the origin trial and are
>>>>>> serving the token, those will be ignored.
>>>>>>
>>>>>> In addition we’re moving the reverse OT for SABs as well starting in
>>>>>> *M92* and ending in M96 (unchanged).
>>>>>>
>>>>>>
>>>>>>
>>>>>> On Thu, Apr 29, 2021 at 10:07 PM Chris Harrelson <
>>>>>> [email protected]> wrote:
>>>>>>
>>>>>>>
>>>>>>>
>>>>>>> On Fri, Apr 16, 2021 at 4:49 AM Lutz Vahl <[email protected]>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> Hi fellow API owners,
>>>>>>>>
>>>>>>>> We've received tons of feedback based on our SAB restriction
>>>>>>>> outreach. Working with partners internally and externally, we've 
>>>>>>>> learned
>>>>>>>> that there are a few workflows we don't yet have a good story for
>>>>>>>> supporting. E.g. COEP adoption is nearly impossible in case 3P content 
>>>>>>>> is
>>>>>>>> provided by users or out of control of the main page, and popup based 
>>>>>>>> OAuth
>>>>>>>> flows are not yet supported in cross-origin isolated contexts.
>>>>>>>>
>>>>>>>> credentialless <https://github.com/mikewest/credentiallessness/>
>>>>>>>> (Planned for M93) -
>>>>>>>>
>>>>>>>> We're looking at a credentialless mode. This allows the
>>>>>>>> cross-origin frame to be embedded even without the setting of headers, 
>>>>>>>> but
>>>>>>>> all requests within the frame are made without credentials. This 
>>>>>>>> mitigates
>>>>>>>> the effect of a Spectre attack in non-OOPIF browsers (since all 
>>>>>>>> resources
>>>>>>>> are unpersonalized, it doesn't matter if they leak).
>>>>>>>>
>>>>>>>> CrossOriginIsolated for COOP: same-origin-allow-popups (Planned
>>>>>>>> for M94)
>>>>>>>>
>>>>>>>> Extending CrossOriginIsolated to COOP: same-origin-allow-popups
>>>>>>>> enabling popup flow based use cases.
>>>>>>>>
>>>>>>>> To not break those use cases in the meantime, we're planning to
>>>>>>>> extend the reverse origin trial (currently planned end M93) until those
>>>>>>>> changes are made and give sites 2x milestones to adapt before ending 
>>>>>>>> the
>>>>>>>> reverse OT for SABs (M96).
>>>>>>>>
>>>>>>>
>>>>>>> Hi,
>>>>>>>
>>>>>>> This plan LGTM.
>>>>>>>
>>>>>>>
>>>>>>>>
>>>>>>>> Cheers,
>>>>>>>>
>>>>>>>> Lutz
>>>>>>>>
>>>>>>>>
>>>>>>>> On Fri, Nov 20, 2020 at 8:34 PM Daniel Bratell <[email protected]>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> Something I took into consideration before adding my lgtm is that
>>>>>>>>> this feature and code has been in flux all since spectre and meltdown
>>>>>>>>> became publicly known. As frustrating as that must be as a web 
>>>>>>>>> developer,
>>>>>>>>> it also means that the code Chromium encounters on the web is newer 
>>>>>>>>> and
>>>>>>>>> more likely to still be in development.
>>>>>>>>>
>>>>>>>>> This change is also about aligning all browsers to do the same
>>>>>>>>> thing, and wherever the deprecation warning triggers, the code will 
>>>>>>>>> already
>>>>>>>>> be broken in other engines. That also increases the likeliness that 
>>>>>>>>> web
>>>>>>>>> developers will fix the code rather than leaving it in the less secure
>>>>>>>>> state.
>>>>>>>>>
>>>>>>>>> Still, Rick has a good point. We do not want a situation where we
>>>>>>>>> end up giving developers warning fatigue, and if that seems probable, 
>>>>>>>>> we
>>>>>>>>> need to find alternative solutions.
>>>>>>>>>
>>>>>>>>> /Daniel
>>>>>>>>> On 2020-11-20 09:19, Lutz Vahl wrote:
>>>>>>>>>
>>>>>>>>> Hi Rick,
>>>>>>>>>
>>>>>>>>> thanks for the feedback, see my comments below.
>>>>>>>>>
>>>>>>>>> On Thu, Nov 19, 2020 at 8:21 PM Rick Byers <[email protected]>
>>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>>> Aligning with other browsers and across operating systems
>>>>>>>>>> definitely seems urgent and important to me. LGTM4
>>>>>>>>>>
>>>>>>>>>> I am, however, a little worried that this thread sounds a little
>>>>>>>>>> bit like past "hopeful deprecation" efforts where we add warnings to
>>>>>>>>>> billions of page loads and then revisit once we realize that 
>>>>>>>>>> warnings are
>>>>>>>>>> not sufficient to get usage down to a level we can break. I also 
>>>>>>>>>> worry a
>>>>>>>>>> lot about warning blindness when we start doing warnings at such a 
>>>>>>>>>> high
>>>>>>>>>> level. In general our experience is that warnings are not a 
>>>>>>>>>> particularly
>>>>>>>>>> powerful way of reducing usage.
>>>>>>>>>>
>>>>>>>>> That's right. Warnings are one part of the puzzle to raise
>>>>>>>>> awareness of the change! In addition blog Posts, videos, virtual 
>>>>>>>>> conference
>>>>>>>>> talks etc. are released or in the making.
>>>>>>>>>
>>>>>>>>> Should we perhaps be looking at UKM data and doing targeted
>>>>>>>>>> outreach to the top sites and see if we can't get the UseCounter 
>>>>>>>>>> down to
>>>>>>>>>> something not so massive before introducing a high-prevalence 
>>>>>>>>>> warning?
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> We do have UKMs in place and are using them currently for success
>>>>>>>>> tracking. We're not able to reach out to all sites currently using 
>>>>>>>>> SABs
>>>>>>>>> (for obvious reasons), but I'll verify if an outreach to the top % 
>>>>>>>>> pages
>>>>>>>>> can be done in the near future.
>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Rick
>>>>>>>>>>
>>>>>>>>>> On Thu, Nov 19, 2020 at 11:26 AM Daniel Bratell <
>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>
>>>>>>>>>>> LGTM3 - May the Use Counters be with you
>>>>>>>>>>>
>>>>>>>>>>> /Daniel
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> On 2020-11-19 11:00, Manuel Rego Casasnovas wrote:
>>>>>>>>>>> > LGTM2
>>>>>>>>>>> >
>>>>>>>>>>> > We in Igalia are very happy to see improvements to
>>>>>>>>>>> interoperability with
>>>>>>>>>>> > other browsers, even if it requires working through difficult
>>>>>>>>>>> compat
>>>>>>>>>>> > issues like this one.
>>>>>>>>>>> >
>>>>>>>>>>> > On 19/11/2020 10:29, Yoav Weiss wrote:
>>>>>>>>>>> >> LGTM1
>>>>>>>>>>> >>
>>>>>>>>>>> >> The plan sounds reasonable, and while current usage is not
>>>>>>>>>>> low, carrots
>>>>>>>>>>> >> (Android + Firefox) and a deadline may be able to drive it
>>>>>>>>>>> down.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >> On Thu, Nov 19, 2020 at 10:04 AM Lutz Vahl <
>>>>>>>>>>> [email protected]
>>>>>>>>>>> >> <mailto:[email protected]>> wrote:
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>      On Thu, Nov 19, 2020 at 9:38 AM Yoav Weiss <
>>>>>>>>>>> [email protected]
>>>>>>>>>>> >>      <mailto:[email protected]>> wrote:
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>          On Thu, Nov 19, 2020 at 9:29 AM Lutz Vahl <
>>>>>>>>>>> [email protected]
>>>>>>>>>>> >>          <mailto:[email protected]>> wrote:
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>              On Thu, Nov 19, 2020 at 7:29 AM Yoav Weiss <
>>>>>>>>>>> [email protected]
>>>>>>>>>>> >>              <mailto:[email protected]>> wrote:
>>>>>>>>>>> >>
>>>>>>>>>>> >>                  The overall plan sounds reasonable to me.
>>>>>>>>>>> >>                  Do you have use counters in place for
>>>>>>>>>>> current usage?
>>>>>>>>>>> >>
>>>>>>>>>>> >>              Yes, SAB use counters are
>>>>>>>>>>> >>              available. V8SharedArrayBufferConstructed
>>>>>>>>>>> >>              <
>>>>>>>>>>> https://chromestatus.com/metrics/feature/popularity#V8SharedArrayBufferConstructed
>>>>>>>>>>> > measured
>>>>>>>>>>> >>              all SAB usage until M87. Starting M87 ONLY gated
>>>>>>>>>>> usage is
>>>>>>>>>>> >>
>>>>>>>>>>> counted. V8SharedArrayBufferConstructedWithoutIsolation
>>>>>>>>>>> >>              <
>>>>>>>>>>> https://chromestatus.com/metrics/feature/popularity#V8SharedArrayBufferConstructedWithoutIsolation
>>>>>>>>>>> > was
>>>>>>>>>>> >>              added in M87 to measure usage without isolated
>>>>>>>>>>> (this usage
>>>>>>>>>>> >>              is planned to be blocked)
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>          The latter is rather high at 1.6%...
>>>>>>>>>>> >>
>>>>>>>>>>> >>      That's right! We're targeting all current users
>>>>>>>>>>> explicitly with
>>>>>>>>>>> >>      deprecation warnings and will reach out to the top %
>>>>>>>>>>> sites using
>>>>>>>>>>> >>      SABs to do our best to bring this number down until May
>>>>>>>>>>> 2021.
>>>>>>>>>>> >>      We think that the Firefox and Chrome on Android
>>>>>>>>>>> reablement of SABs
>>>>>>>>>>> >>      gated behind COI will have a positive impact as well.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                  Any sense regarding how much of that usage
>>>>>>>>>>> will have a
>>>>>>>>>>> >>                  hard time adapting to the crossOrigin
>>>>>>>>>>> isolation
>>>>>>>>>>> >>                  requirements? (e.g. content that incorporates
>>>>>>>>>>> >>                  credentialed and sensitive information in
>>>>>>>>>>> the iframes it
>>>>>>>>>>> >>                  loads)
>>>>>>>>>>> >>
>>>>>>>>>>> >>              It all depends on the architecture of the app.
>>>>>>>>>>> Facebook &
>>>>>>>>>>> >>              Twitter managed to adopt COOP/COEP very quickly.
>>>>>>>>>>> We do see
>>>>>>>>>>> >>              some complexity in heavily integrated apps as
>>>>>>>>>>> all 3P
>>>>>>>>>>> >>              dependencies need to be marked emaddebal via
>>>>>>>>>>> CORP or CORS
>>>>>>>>>>> >>              and in case 3P is loaded into iframes even via
>>>>>>>>>>> COEP.
>>>>>>>>>>> >>              This is why we send out the I2S early and are
>>>>>>>>>>> planning lot's
>>>>>>>>>>> >>              of comms to inform developers about the change
>>>>>>>>>>> and how to adapt.
>>>>>>>>>>> >>              Last but not least we've included the reverse OT
>>>>>>>>>>> to the
>>>>>>>>>>> >>              rollout plan to be able to extend the migration
>>>>>>>>>>> period for
>>>>>>>>>>> >>              some apps if needed. We're checking the SAB use
>>>>>>>>>>> counters
>>>>>>>>>>> >>              linked above continuously to monitor the
>>>>>>>>>>> adoption and to be
>>>>>>>>>>> >>              able to ramp up more comms if needed.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                  On Wed, Nov 18, 2020 at 4:56 PM Lutz Vahl
>>>>>>>>>>> >>                  <[email protected] <mailto:
>>>>>>>>>>> [email protected]>> wrote:
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Contact emails
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      [email protected] <mailto:
>>>>>>>>>>> [email protected]>,
>>>>>>>>>>> >>                      [email protected] <mailto:
>>>>>>>>>>> [email protected]>,
>>>>>>>>>>> >>                      [email protected] <mailto:
>>>>>>>>>>> [email protected]>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Explainer
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://docs.google.com/document/d/1zDlfvfTJ_9e8Jdc8ehuV4zMEu9ySMCiTGMS9y0GU92k
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Specification
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://tc39.github.io/ecma262/#sec-sharedarraybuffer-objects
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Design docs Including the new
>>>>>>>>>>> security
>>>>>>>>>>> >>                              requirements
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/SharedArrayBuffer
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Discussion how and what to gate
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://github.com/whatwg/html/issues/4732
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Summary
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      ‘SharedArrayBuffers’ (SABs) on desktop
>>>>>>>>>>> platforms
>>>>>>>>>>> >>                      will be restricted to cross-origin
>>>>>>>>>>> isolated
>>>>>>>>>>> >>                      environments, matching the behavior
>>>>>>>>>>> we've recently
>>>>>>>>>>> >>                      shipped on Android and Firefox. We're
>>>>>>>>>>> aiming for
>>>>>>>>>>> >>                      Chrome 91 to make this change.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      This I2S will gate the usage of SABs on
>>>>>>>>>>> Desktop
>>>>>>>>>>> >>                      behind COOP/COEP and is a follow up on
>>>>>>>>>>> ‘Planning
>>>>>>>>>>> >>                      isolation requirements (COOP/COEP) for
>>>>>>>>>>> >>                      SharedArrayBuffer
>>>>>>>>>>> >>                      <
>>>>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/_0MEXs6TJhg/m/QzWOGv7pAQAJ
>>>>>>>>>>> >’.
>>>>>>>>>>> >>                      Only sites opt-in to cross-origin
>>>>>>>>>>> isolated will be
>>>>>>>>>>> >>                      able to use the feature. This change is
>>>>>>>>>>> targeted for
>>>>>>>>>>> >>                      Chrome 91 (Release planned 2021-05-25)
>>>>>>>>>>> to align
>>>>>>>>>>> >>                      Chrome with other browsers and all
>>>>>>>>>>> platforms.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Feature in detail
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      SharedArrayBuffers can be used to make
>>>>>>>>>>> >>                      high-resolution timers. High-resolution
>>>>>>>>>>> timers
>>>>>>>>>>> >>                      simplify Spectre attacks on cross-origin
>>>>>>>>>>> resources.
>>>>>>>>>>> >>                      To mitigate Spectre attacks, all browser
>>>>>>>>>>> vendors
>>>>>>>>>>> >>                      disabled SharedArrayBuffers in January
>>>>>>>>>>> 2018. Chrome
>>>>>>>>>>> >>                      M67 re-enabled SharedArrayBuffers on
>>>>>>>>>>> platforms
>>>>>>>>>>> >>                      (Desktop) where Site Isolation is
>>>>>>>>>>> supported.
>>>>>>>>>>> >>                      ‘crossOriginIsolated’ allows us to
>>>>>>>>>>> enable the
>>>>>>>>>>> >>                      isolation on other devices and
>>>>>>>>>>> platforms. Therefore
>>>>>>>>>>> >>                      we’re planning to align the usage of
>>>>>>>>>>> SABs across all
>>>>>>>>>>> >>                      platforms gated behind
>>>>>>>>>>> ‘crossOriginIsolated’.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Timeline and plan
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      _Right now_: Add deprecation warnings
>>>>>>>>>>> and metrics,
>>>>>>>>>>> >>                      continue to work with developers and
>>>>>>>>>>> provide
>>>>>>>>>>> >>                      guidance on how to migrate. Probably add
>>>>>>>>>>> an
>>>>>>>>>>> >>                      enterprise policy of some sort as an
>>>>>>>>>>> opt-out.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      _After the holiday season (Jan 2021_):
>>>>>>>>>>> More outreach
>>>>>>>>>>> >>                      to current users of SABs which need to
>>>>>>>>>>> opt-in to
>>>>>>>>>>> >>                      crossOriginIsolated via COOP/COEP
>>>>>>>>>>> headers to
>>>>>>>>>>> >>                      continue to use this API starting from
>>>>>>>>>>> M91. For
>>>>>>>>>>> >>                      testing purposes a flag will be added to
>>>>>>>>>>> gate the
>>>>>>>>>>> >>                      API already behind a flag. We think
>>>>>>>>>>> about gating the
>>>>>>>>>>> >>                      API on pre-release channels (M89 or M90)
>>>>>>>>>>> earlier as
>>>>>>>>>>> >>                      on stable.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      _M91_: Gate by default, assuming we can
>>>>>>>>>>> drive
>>>>>>>>>>> >>                      numbers down to reasonable levels and
>>>>>>>>>>> start a
>>>>>>>>>>> >>                      reverse origin trial to allow developers
>>>>>>>>>>> to use SABs
>>>>>>>>>>> >>                      in none cross-origin isolated
>>>>>>>>>>> environments.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      _M93_: Planned end of the reverse origin
>>>>>>>>>>> trial in
>>>>>>>>>>> >>                      case the numbers are reasonable down. If
>>>>>>>>>>> there is
>>>>>>>>>>> >>                      the need we can extend the OT
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Blink component
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Blink>JavaScript
>>>>>>>>>>> >>                      <
>>>>>>>>>>> https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EJavaScript
>>>>>>>>>>> >
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Search tags
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      SharedArrayBuffer
>>>>>>>>>>> >>                      <
>>>>>>>>>>> https://chromestatus.com/features#tags:SharedArrayBuffer>,
>>>>>>>>>>> >>                      SAB <
>>>>>>>>>>> https://chromestatus.com/features#tags:SAB>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              TAG review
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://github.com/w3ctag/design-reviews/issues/471
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              TAG review status
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Closed
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Risks
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Interoperability and
>>>>>>>>>>> Compatibility
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      We expect this change to negatively
>>>>>>>>>>> impact
>>>>>>>>>>> >>                      developers using `SharedArrayBuffer`
>>>>>>>>>>> today. These
>>>>>>>>>>> >>                      developers are already impacted by the
>>>>>>>>>>> changes
>>>>>>>>>>> >>                      shipping in Firefox, and it's important
>>>>>>>>>>> that we
>>>>>>>>>>> >>                      shift our implementation to match theirs
>>>>>>>>>>> as quickly
>>>>>>>>>>> >>                      as is reasonable in order to ensure that
>>>>>>>>>>> developers
>>>>>>>>>>> >>                      create isolated environments to protect
>>>>>>>>>>> their users
>>>>>>>>>>> >>                      from attack. We aim to mitigate these
>>>>>>>>>>> risks by
>>>>>>>>>>> >>                      adopting a longer-than-usual
>>>>>>>>>>> depreciation period
>>>>>>>>>>> >>                      with console warnings/issues, along with
>>>>>>>>>>> >>                      communication via other channels.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Gecko: Shipped/Shipping
>>>>>>>>>>> >>                      (
>>>>>>>>>>> https://bugzilla.mozilla.org/show_bug.cgi?id=1312446)
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      WebKit: No signals
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Web developers: Positive
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Will this feature be supported
>>>>>>>>>>> on all six
>>>>>>>>>>> >>                              Blink platforms (Windows, Mac,
>>>>>>>>>>> Linux, Chrome
>>>>>>>>>>> >>                              OS, Android, and Android
>>>>>>>>>>> WebView)?
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      No -
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Android was shipped:
>>>>>>>>>>> >>
>>>>>>>>>>> https://chromestatus.com/feature/5171863141482496
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Android WebView is currently not
>>>>>>>>>>> supporting COOP,
>>>>>>>>>>> >>                      but SABs never worked on WebView
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      All other platforms are affected by this
>>>>>>>>>>> change
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Is this feature fully tested by
>>>>>>>>>>> >>                              web-platform-tests
>>>>>>>>>>> >>                              <
>>>>>>>>>>> https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md
>>>>>>>>>>> >?
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      For SABs
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://github.com/tc39/test262/tree/master/test/built-ins/SharedArrayBuffer
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://github.com/tc39/test262/tree/master/test/built-ins/Atomics
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      For gated SAB usage on Android/Desktop
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://source.chromium.org/chromium/chromium/src/+/master:third_party/blink/web_tests/external/wpt/html/infrastructure/safe-passing-of-structured-data/shared-array-buffers/no-coop-coep.https.any.js
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Addition test might get added during the
>>>>>>>>>>> development
>>>>>>>>>>> >>                      of the Desktop gating
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Tracking bug
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1144104
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Old bug to enable them on Desktop with
>>>>>>>>>>> site
>>>>>>>>>>> >>                      isolation:
>>>>>>>>>>> >>
>>>>>>>>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=709179
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Launch bug
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1138860
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Blink-dev Thread
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Planning isolation requirements
>>>>>>>>>>> (COOP/COEP) for
>>>>>>>>>>> >>                      SharedArrayBuffer
>>>>>>>>>>> >>                      <
>>>>>>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/_0MEXs6TJhg/m/QzWOGv7pAQAJ
>>>>>>>>>>> >
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                              Link to entry on the Chrome
>>>>>>>>>>> Platform Status
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> https://chromestatus.com/feature/4570991992766464
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      (Android one:
>>>>>>>>>>> >>
>>>>>>>>>>> https://chromestatus.com/feature/5171863141482496)
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      This intent message was generated by
>>>>>>>>>>> Chrome Platform
>>>>>>>>>>> >>                      Status <https://www.chromestatus.com/>.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Lutz Vahl
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Technical Program Manager
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Google Germany GmbH
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Erika-Mann-Strasse 36
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      80636 München
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Geschäftsführer: Paul Manicle, Halimah
>>>>>>>>>>> DeLaine Prado
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Registergericht und -nummer: Hamburg,
>>>>>>>>>>> HRB 86891
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Sitz der Gesellschaft: Hamburg
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      Diese E-Mail ist vertraulich. Falls Sie
>>>>>>>>>>> diese
>>>>>>>>>>> >>                      fälschlicherweise erhalten haben
>>>>>>>>>>> sollten, leiten Sie
>>>>>>>>>>> >>                      diese bitte nicht an jemand anderes
>>>>>>>>>>> weiter, löschen
>>>>>>>>>>> >>                      Sie alle Kopien und Anhänge davon und
>>>>>>>>>>> lassen Sie
>>>>>>>>>>> >>                      mich bitte wissen, dass die E-Mail an
>>>>>>>>>>> die falsche
>>>>>>>>>>> >>                      Person gesendet wurde.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      This e-mail is confidential. If you
>>>>>>>>>>> received this
>>>>>>>>>>> >>                      communication by mistake, please don't
>>>>>>>>>>> forward it to
>>>>>>>>>>> >>                      anyone else, please erase all copies and
>>>>>>>>>>> >>                      attachments, and please let me know that
>>>>>>>>>>> it has gone
>>>>>>>>>>> >>                      to the wrong person.
>>>>>>>>>>> >>
>>>>>>>>>>> >>
>>>>>>>>>>> >>                      --
>>>>>>>>>>> >>                      You received this message because you
>>>>>>>>>>> are subscribed
>>>>>>>>>>> >>                      to the Google Groups "blink-dev" group.
>>>>>>>>>>> >>                      To unsubscribe from this group and stop
>>>>>>>>>>> receiving
>>>>>>>>>>> >>                      emails from it, send an email to
>>>>>>>>>>> >>                      [email protected]
>>>>>>>>>>> >>                      <mailto:[email protected]>.
>>>>>>>>>>> >>                      To view this discussion on the web visit
>>>>>>>>>>> >>
>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBNHgCAdCAorgU_qPcjTneVhpMvtQB6nhEzSOz%2BMBrJ-YA%40mail.gmail.com
>>>>>>>>>>> >>                      <
>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBNHgCAdCAorgU_qPcjTneVhpMvtQB6nhEzSOz%2BMBrJ-YA%40mail.gmail.com?utm_medium=email&utm_source=footer
>>>>>>>>>>> >.
>>>>>>>>>>> >>
>>>>>>>>>>> >>                  --
>>>>>>>>>>> >>                  You received this message because you are
>>>>>>>>>>> subscribed to
>>>>>>>>>>> >>                  the Google Groups "blink-dev" group.
>>>>>>>>>>> >>                  To unsubscribe from this group and stop
>>>>>>>>>>> receiving emails
>>>>>>>>>>> >>                  from it, send an email to
>>>>>>>>>>> >>                  [email protected]
>>>>>>>>>>> >>                  <mailto:[email protected]>.
>>>>>>>>>>> >>                  To view this discussion on the web visit
>>>>>>>>>>> >>
>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACj%3DBEg%2BKRCFrQ-pLfWabAJd_09U-eCbf46mkEhX0Bd1AXG%3DaQ%40mail.gmail.com
>>>>>>>>>>> >>                  <
>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACj%3DBEg%2BKRCFrQ-pLfWabAJd_09U-eCbf46mkEhX0Bd1AXG%3DaQ%40mail.gmail.com?utm_medium=email&utm_source=footer
>>>>>>>>>>> >.
>>>>>>>>>>> >>
>>>>>>>>>>> >> --
>>>>>>>>>>> >> You received this message because you are subscribed to the
>>>>>>>>>>> Google
>>>>>>>>>>> >> Groups "blink-dev" group.
>>>>>>>>>>> >> To unsubscribe from this group and stop receiving emails from
>>>>>>>>>>> it, send
>>>>>>>>>>> >> an email to [email protected]
>>>>>>>>>>> >> <mailto:[email protected]>.
>>>>>>>>>>> >> To view this discussion on the web visit
>>>>>>>>>>> >>
>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACj%3DBEjX5tw2EjpOrHwr%2BeSzQWGT7szz1PpnjHbQsjK3gdxMQA%40mail.gmail.com
>>>>>>>>>>> >> <
>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACj%3DBEjX5tw2EjpOrHwr%2BeSzQWGT7szz1PpnjHbQsjK3gdxMQA%40mail.gmail.com?utm_medium=email&utm_source=footer
>>>>>>>>>>> >.
>>>>>>>>>>>
>>>>>>>>>>> --
>>>>>>>>>>> You received this message because you are subscribed to the
>>>>>>>>>>> Google Groups "blink-dev" group.
>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from
>>>>>>>>>>> it, send an email to [email protected].
>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/7d7d2060-efe4-bd7e-87c7-fd8af21b5e5b%40gmail.com
>>>>>>>>>>> .
>>>>>>>>>>>
>>>>>>>>>> --
>>>>>>>>>> You received this message because you are subscribed to the
>>>>>>>>>> Google Groups "blink-dev" group.
>>>>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>>>>> send an email to [email protected].
>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY9idBpi0nF9aZPDM5xbBvXbdjv9EV3c2Sb%2Bp3HK_utcCQ%40mail.gmail.com
>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY9idBpi0nF9aZPDM5xbBvXbdjv9EV3c2Sb%2Bp3HK_utcCQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>> .
>>>>>>>>>>
>>>>>>>>> --
>>>>>>>> You received this message because you are subscribed to the Google
>>>>>>>> Groups "blink-dev" group.
>>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>>> send an email to [email protected].
>>>>>>>> To view this discussion on the web visit
>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBOwUUhY93WEJcXj4OvS%2B7DKyRbQOQbrWDn9LWeibaBJBg%40mail.gmail.com
>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBOwUUhY93WEJcXj4OvS%2B7DKyRbQOQbrWDn9LWeibaBJBg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>> .
>>>>>>>>
>>>>>>> --
>>>>>>> You received this message because you are subscribed to the Google
>>>>>>> Groups "blink-dev" group.
>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>> send an email to [email protected].
>>>>>>> To view this discussion on the web visit
>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw_frHFHac1DFLWgjCECFJRT72LMvM%3DuMb4gysCcSwEm-g%40mail.gmail.com
>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw_frHFHac1DFLWgjCECFJRT72LMvM%3DuMb4gysCcSwEm-g%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>> .
>>>>>>>
>>>>>> --
>>>>>> You received this message because you are subscribed to the Google
>>>>>> Groups "blink-dev" group.
>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>> send an email to [email protected].
>>>>>>
>>>>> To view this discussion on the web visit
>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBOf4EXV3j7_7e2GhigWg4CWbPn_rbgONc7Va6NjojEi_w%40mail.gmail.com
>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBOf4EXV3j7_7e2GhigWg4CWbPn_rbgONc7Va6NjojEi_w%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>> .
>>>>>>
>>>>> --
>> You received this message because you are subscribed to the Google Groups
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to [email protected].
>> To view this discussion on the web visit
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBMifOYpxC9Mj2ZhKxoHAh0_7qLCGkQ93qS4T-EJUCH5kw%40mail.gmail.com
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBMifOYpxC9Mj2ZhKxoHAh0_7qLCGkQ93qS4T-EJUCH5kw%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to [email protected].
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfX3Qsb3eBdN2BXj8z4Gva0cCv%3D1Aqntqix9Z76dYoWKUw%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfX3Qsb3eBdN2BXj8z4Gva0cCv%3D1Aqntqix9Z76dYoWKUw%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAH0ixBORtTnun1UK9_JFpxfiYUCy2GhrzNfqmzLd3%3Dn%3DKsQ1tg%40mail.gmail.com.

Reply via email to