> Robert, in your case could you use the permission policy to re-enable 
unload events on the frame until we come up with a better fix? Or are there 
scenarios where you lack the ability to add "allow=" attributes to the 
iframe elements?

If I understand correctly, this attribute has to be set before the frames 
load?
On Friday, 28 July 2023 at 08:15:43 UTC+1 Robert Knight wrote:

> Hi Fergal,
>
> In the general case the frames involved in communication may be cross 
> origin, though I think we could find workarounds for the most common use 
> cases, possibly using Web Locks.
>
> > Could you give us some more detail on the structure of this 
> communication? How do you end up with a document that has a different 
> life-cycle to the document in question?
> > Is it a long-lived hypothesis window that reacts to sites 
> appearing/disappearing that support Hypothesis?
>
> Essentially, yes. The environment consists of a "host" frame where 
> Hypothesis is initially loaded, a long-lived "sidebar" frame that displays 
> the user's annotations, and shorter-lived "guest" frames that contain 
> content that can be annotated. In the simple case, there is one guest frame 
> which is also the host frame. The sidebar is always cross-origin. The host 
> and guest frames may be cross origin, though they are currently same origin 
> in the use cases we care about most.
>
> The typical use case would be an ebook reader that has a container frame 
> (the host) with book navigation controls, and a child frame (the guest) 
> that contains the content for the current chapter, which gets swapped out 
> each time the user navigates from one chapter to another. 
>
> Kind Regards,
> Robert.
> On Friday, 28 July 2023 at 04:17:05 UTC+1 Fergal Daly wrote:
>
>> [CC: bfcache-dev, BCC: blink-dev and others we can discuss this and get 
>> back with a summary, let me know if you want a CC ]
>>
>> On Tue, 11 Jul 2023 at 16:44, Robert Knight <robert...@gmail.com> wrote:
>>
>>> Hello,
>>>
>>> Hypothesis (https://web.hypothes.is, a web page/PDF/ebook annotation 
>>> tool) uses the "unload" event to signal to one end of a message channel 
>>> when the other end is in a frame that is about to go away. This is a 
>>> workaround for the lack of a "close" event in the Channel Messaging API (
>>> https://github.com/whatwg/html/issues/1766). If unload events are going 
>>> to be removed from the web platform, it would be useful to have a proper 
>>> solution for detecting when a MessagePort becomes disconnected 
>>> ("disentangled").
>>>
>>
>> I've spent some time digging into that "close" event. It does seem like a 
>> clear hole in the platform but there are a lot of details to get right. 
>> Fixing it may be an option but I don't know how quickly that could be done.
>>
>> I would also point out that `unload` is already pretty broken on mobile 
>> (and desktop Safari). If the page can enter BFCache it will not fire 
>> unload. This is the currently specced behaviour and the current behaviour 
>> on everything except Chrome Desktop and Mozilla desktop (and derivatives). 
>> So even if we were not deprecating unload, I think you are in need of a 
>> work-around (but we are definitely making that need more intense).
>>
>> I see that some people are using web locks as an alternative. Does that 
>> work for you? It only works if communication is same-origin. Channels are 
>> intended to work cross-origin, so it's a poor work-around.
>>
>> Could you give us some more detail on the structure of this 
>> communication? How do you end up with a document that has a different 
>> life-cycle to the document in question? Is it a long-lived hypothesis 
>> window that reacts to sites appearing/disappearing that support Hypothesis?
>>
>> F
>>  
>>
>>>
>>> Kind Regards,
>>> Robert Knight
>>>
>>> On Monday, 10 July 2023 at 08:13:49 UTC+1 Yoav Weiss wrote:
>>>
>>> Thanks for chiming in, Brandon!
>>>
>>> I'm glad to hear that the Enterprise constituency is comfortable with 
>>> the plan.
>>> I'm concerned that there may be a couple other constituencies that may 
>>> not be:
>>>
>>>    - Third party widgets that currently use unload to send a single 
>>>    "end of page" beacon. fetchLater() 
>>>    <https://github.com/WICG/pending-beacon> is aiming to be that 
>>>    replacement, but it's not ready just yet.
>>>    - Enterprise SAAS providers that don't have direct and immediate 
>>>    control over their customers' application configuration, nor on their 
>>>    users' Enterprise Policy.
>>>
>>> I think that a short-lived 3P deprecation trial may address these 
>>> constituencies as well. Would you consider adding that to your plans?
>>>
>>> On Sat, Jul 8, 2023 at 12:55 AM 'Brandon Heenan' via blink-dev <
>>> blin...@chromium.org> wrote:
>>>
>>> Hello, I'm chiming in to provide some thoughts from the enterprise 
>>> perspective.
>>>
>>> Our goal is to not block forward progress to the web, but to improve the 
>>> web in an enterprise-friendly way. You shouldn't ever hear me say "you 
>>> can't do X because it's scary to the enterprise team." You should instead 
>>> hear "We expect X to be risky, but here are the things we know we can do to 
>>> make it much less risky."
>>>
>>> In this case, yes, this is risky for enterprises. We can say this with 
>>> confidence because we've seen escalations before when we've made changes to 
>>> unload events (crbug.com/933153,  crbug.com/953228).
>>>
>>> Kenji and Daisuke have been working with us, and my understanding of the 
>>> plan is to:
>>>
>>>    - 
>>>    
>>>    Allow developers to opt-in early to the new behavior (unload event 
>>>    ignored) with a permission policy
>>>    - 
>>>    
>>>    Communicate the change on chromestatus and the enterprise release 
>>>    notes (already happening 
>>>    
>>> <https://support.google.com/chrome/a/answer/7679408?sjid=15316582819754370342-NA#skpUnload114>).
>>>  
>>>    We will provide a bug link for customers for feedback in a future 
>>> release.
>>>    - 
>>>    
>>>    Reach out to enterprises and developers we expect to be affected
>>>    - 
>>>    
>>>    Introduce an enterprise policy to allow an IT admin to control 
>>>    unload event behavior
>>>    - 
>>>    
>>>    Introduce a flag in chrome://flags/deprecated to allow end users to 
>>>    control unload event behavior
>>>    - 
>>>    
>>>    As early as M117, change the default for the policy so that unload 
>>>    events will be ignored. This is the breaking change, and there's likely 
>>> to 
>>>    be friction here. The two escalations mentioned above both resulted in 
>>>    respins the first time they reached this point. However, this time 
>>> around, 
>>>    IT admins will be able to fix their environment immediately with the 
>>>    enterprise policy, end users will be able to fix themselves with the 
>>>    deprecation flag, and developers will be able to fix their app with the 
>>>    permission policy. With those mitigations in place, the risk of 
>>> requiring a 
>>>    respin (or Finch rollback) due to enterprise impact is dramatically 
>>>    reduced, and this is how we eventually successfully shipped both of 
>>> those 
>>>    above escalations.
>>>    - 
>>>    
>>>    We expect a long transition period after that. By default, the 
>>>    unload event is ignored, but different stakeholders are able to revert 
>>> to 
>>>    legacy behavior. Within enterprise, we expect the enterprise policy to 
>>> be 
>>>    the most useful mitigation, and the deprecation flag is the backup for 
>>> BYOD 
>>>    or unmanaged devices. For the above escalations, this migration period 
>>> was 
>>>    over a year, and I'm expecting something similar this time.
>>>    - 
>>>    
>>>    At some point in the future, we expect to remove those mitigations 
>>>    and remove support for the unload event completely. We don't have any 
>>>    specific dates for that yet; we will be responsive to the needs of web 
>>>    stakeholders, enterprise and otherwise.
>>>    
>>> The two escalations I mentioned above were successfully resolved and the 
>>> changes to not allow popups on page unload and to not allow synchronous 
>>> XHRs on page unload were shipped. Both of those changes followed 
>>> essentially the same plan I just laid out above, and so I think it's 
>>> reasonable to do the same thing here.
>>>
>>>
>>> On Thursday, June 29, 2023 at 7:02:06 AM UTC-7 Rick Byers wrote:
>>>
>>> On Thu, Jun 29, 2023 at 1:47 AM Kenji Baheux <kenji...@google.com> 
>>> wrote:
>>>
>>>
>>> On Thu, Jun 29, 2023 at 1:48 PM Fergal Daly <fer...@google.com> wrote:
>>>
>>> On Thu, 29 Jun 2023 at 01:16, Rick Byers <rby...@chromium.org> wrote:
>>>
>>> Hi Fergal,
>>> Thanks for pushing through this contentious and challenging deprecation. 
>>> We discussed this in the API owners meeting today and were worried that 
>>> this plan seemed likely to be seriously problematic for enterprises (policy 
>>> opt-out is helpful, but far from a silver bullet unfortunately). To what 
>>> extent have you engaged with them and worked to follow the enterprise 
>>> breaking change policy 
>>> <https://www.chromium.org/developers/enterprise-changes/>? Our hunch is 
>>> that at 1% or 5% we'd get escalations forcing us to abandon this plan. Of 
>>> course, if the enterprise team is OK with it, we could always try anyway 
>>> and see if our hunch is right. It's possible I'm over-indexing on past 
>>> experiences like deprecating sync XHR in unload handlers 
>>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/LnqwTCiT9Gs/m/tO0IBO4PAwAJ>
>>>  
>>> and that the enterprise world is different now, but I doubt it :-).
>>>
>>>
>>> In addition to Daisuke's response... are you concerned about enterprises 
>>> that are not using fleet management and so cannot use the opt-out? If you 
>>> think an enterprise policy will not be sufficient, a mitigation for those 
>>> enterprises would be for us to publish an extension that allows anyone to 
>>> re-enable unload (for all sites or for specific sites) by injecting the 
>>> PP:unload header. Are the escalations that can't be resolved by either a 
>>> policy or extension?
>>>
>>>
>>> One extra comment on the extension option (great for desktop).
>>>
>>> If you wonder about the mobile BYOD scenarios, where extensions don't 
>>> exist, then we are a bit lucky here because unload is already unreliable on 
>>> mobile. So, it seems extremely unlikely that we'd see mobile enterprise/edu 
>>> products that rely on unload on mobile.
>>>
>>> *Rick:* are there specific scenarios / environments that we haven't 
>>> covered?
>>>
>>>
>>> I'm glad to see the conversation with the enterprise team is further 
>>> along than I had realized. Having skip unload events in the release 
>>> notes 
>>> <https://support.google.com/chrome/a/answer/7679408?sjid=5091298988245423514-NA#skpUnloadEv113>
>>>  
>>> since M113 is a significant mitigation, sorry I wasn't caught up on the 
>>> latest. And yes some sort of user opt-out for BYOD (extension or 
>>> chrome::/flags, etc.) seems like an essential mitigation. I defer to the 
>>> enterprise team's judgement here, so if they're OK with proceeding then we 
>>> shouldn't let my enterprise fears block us. I expect we do need some easy 
>>> way for an application to signal that it really does need unload handlers. 
>>> Setting a permission policy is likely orders of magnitude easier than 
>>> converting essential unload handlers to pagehide and ensuring they're safe 
>>> to invoke multiple times.
>>>
>>> The other major constituency potentially impacted are ad networks. 
>>> Perhaps the next step should be a 1% finch trial where we can measure 
>>> various ad-related metrics? I'd defer to the judgment of the Chrome Ads 
>>> team (@Josh Karlin).
>>>
>>> Anyway, I'm personally OK with 1% stable experiments (and whatever else 
>>> on dev/beta). But I think we should discussing learnings from such 1% 
>>> experiments here publicly before approving a plan to go beyond that.
>>>
>>> In general Yoav and I disagree with the WebKit and Gecko feedback here 
>>> and suspect that your original PP default-on proposal is far more likely to 
>>> be a successful deprecation path for Chrome (and, should they choose to 
>>> follow, Edge). I can understand why Firefox and WebKit don't have the same 
>>> constraints around enterprises and so would choose differently for 
>>> themselves. Yoav and I are happy to help in the standards discussions. I'm 
>>> about to go on vacation for 2 weeks but Yoav said he'd follow up with you 
>>> privately to brainstorm next steps. Sound good?
>>>
>>>
>>> I would love to get moving on PP:unload ASAP no matter what. It's been 
>>> through OT and is sitting behind a flag with some sites eager to use it. 
>>> I'm happy to send an I2S for that while we discuss the harder problem. We 
>>> hope that getting that out there can clear out a large chunk of the 1st- 
>>> and 3rd-party unload usage,
>>>
>>>
>>> +1, I'd suggest doing that regardless.
>>>
>>> There are a few large sites that have done some legwork on 
>>> unload handlers (theirs and third party partners), and are interested in 
>>> pushing the remaining unload handlers out with PP:unload. Having allies in 
>>> the ecosystem (i.e. extra incentives to migrate), will be helpful going 
>>> forward :)
>>>
>>>
>>> Yep I think this was Yoav and my primary concern. For chrome to have a 
>>> pragmatic and reasonable deprecation path given our user base, we really 
>>> need sites adopting such an API. If we're not going to actually ship such 
>>> an API then I think we'd have to give up on deprecating unload. I'd support 
>>> shipping this API despite the lack of support from WebKit and Gecko. 
>>>  
>>>
>>> F
>>>  
>>>
>>>
>>> Rick
>>>
>>>
>>> On Wed, Jun 28, 2023 at 4:07 AM Fergal Daly <fer...@google.com> wrote:
>>>
>>> Hi API-owners,
>>>
>>>
>>> I am now asking for permission to go ahead with the following concrete 
>>> unload deprecation plan below.
>>>
>>>
>>>
>>>    - 
>>>    
>>>    Tools and outreach
>>>    - 
>>>       
>>>       M115 Enable `Permission-Policy: unload` (PP:unload) with the 
>>>       default being enabled. This allows sites to opt-in to unload 
>>> deprecation.
>>>       - 
>>>       
>>>       Outreach to 1st/3rd parties, to migrate away from using unload 
>>>       and to enforce this with PP:unload.
>>>       - 
>>>    
>>>    Deprecation
>>>    - 
>>>       
>>>       M117 change the default for PP:unload so that unload handlers are 
>>>       skipped by default for 1% of page loads
>>>       - 
>>>       
>>>       M118 increase to 5% of page loads
>>>       - 
>>>       
>>>       M119 (last of 2023) increase to 10% of page loads
>>>       - 
>>>       
>>>       Evaluate progress on reduction of the use of unload
>>>       - 
>>>       
>>>       M120-128 increase +10% gradually to 100% of page loads
>>>       
>>>
>>> Enterprise policy would allow opt-out entirely.
>>>
>>>
>>> Obviously, the deprecation timeline is contingent on unload usage coming 
>>> down in response to the earlier steps.
>>>
>>> We expect that 10% of page loads will provide a noticeable signal to 
>>> sites that use unload. Also, if we were to just follow the current spec and 
>>> not run unload when we can BFCache (as happens on Clank/Firefox mobile and 
>>> all WebKit) we expect that we would skip 30-40% of unload handlers when the 
>>> main frame navigates.
>>>
>>> Decisions:
>>>
>>>    - 
>>>    
>>>    Timeline
>>>    - 
>>>    
>>>    All navigations vs main-frame navigations only
>>>    
>>>
>>> Standardising
>>>
>>> We have some new data and have had some further discussions with browser 
>>> vendors. There's no consensus. TL;DR WebKit are opposed to any 
>>> Permissions-Policy but support removing unload eventually. Mozilla are 
>>> still discussing.
>>>
>>> Both Mozilla <https://github.com/mozilla/standards-positions/issues/691> 
>>> and WebKit <https://github.com/WebKit/standards-positions/issues/127> 
>>> were opposed to standardising `Permissions-Policy: unload` (defaulting to 
>>> on) because they worried that a containing frame might selectively disable 
>>> unload handlers in a child frame for malicious purposes (no specific cases 
>>> were discussed).
>>>
>>> So we flipped to the idea of having PP:unload with the default being 
>>> disabled. We cannot suddenly do that. We need to roll it out gradually. 
>>> WebKit folks are opposed to this and have suggested 
>>> <https://github.com/WebKit/standards-positions/issues/200#issuecomment-1596385073>
>>>  
>>> we do a reverse origin trial instead. If our plan works out, eventually we 
>>> would ROT as the final nail but ROT starting now has downsides for users 
>>> and sites and no upside for the implementer.
>>>
>>> Mozilla has so far not been negative 
>>> <https://github.com/mozilla/standards-positions/issues/691> on the 
>>> Permissions-Policy off-by-default approach but they are still discussing. 
>>> They are concerned that disabling unloads when subframes are navigating 
>>> could be a problem. We found that about 1/4 of subframe navigations involve 
>>> an `unload` handler (most seem to involve handlers in cross-site and 
>>> same-site site frames). We don't have examples of sites that rely on 
>>> `unload` handlers in this way, although they probably do exist. Migrating 
>>> to `pageshow` or using PP:unload for these sites should be trivial.
>>>
>>> We have the option to say that PP:unload only applies to main frame 
>>> navigations. This would mean these sites would be completely unaffected 
>>> however that has some downsides. It is harder to explain and does not end 
>>> with full removal of `unload`. We would prefer to have this apply to all 
>>> navigations unless we find a good reason not to. If we were to change 
>>> part-way, there would be no breakage. We hope that once we drive down usage 
>>> in 3rd-part iframes with PP:unload that the number of unload handlers 
>>> running in subframe navigations decreases significantly.
>>>
>>> Finally there was some discussion 
>>> <https://github.com/w3c/webappsec-permissions-policy/issues/513#issuecomment-1564361739>
>>>  
>>> about how Permissions-Policy off-by-default should work. Our current 
>>> version requires every page to set the header and every parent to set the 
>>> iframe `allow` attribute. This is maximally conservative. If at some point 
>>> later on there is agreement to standardise on something less conservative, 
>>> it will not break pages that have already re-enabled `unload`.
>>>
>>>
>>> Overall it seems hard to standardise in advance but if we succeed in 
>>> driving down `unload` usage, other browsers are on-board with removing 
>>> unload. The worst case scenario would be where we implement PP:unload 
>>> (which the others do not agree with) but make no noticeable progress on 
>>> `unload` usage. If that happens we can just go with the currently specced 
>>> behaviour (don't run `unload` if BFCaching is possible) and maybe revert 
>>> the PP:unload,
>>>
>>> F
>>>
>>> On Tue, 9 May 2023 at 16:01, Fergal Daly <fer...@google.com> wrote:
>>>
>>> On Mon, 8 May 2023 at 17:51, Rick Byers <rby...@chromium.org> wrote:
>>>
>>> Hi Fergal,
>>> It's exciting to see this moving forward! Just to clarify, this is 
>>> effectively an I2S for the unload permissions-policy, is that right? Or are 
>>> you also requesting permission to stop firing unload events now too?  The 
>>> latter is going to require some significant compat analysis, but could be 
>>> greatly informed by the experience of having some top-level sites opt-out 
>>> of unload for their frame tree.
>>>
>>>
>>> Thanks.
>>>
>>> We're not requesting permission to stop firing at this point. It is the 
>>> far-away end-point. 
>>>  
>>>
>>>
>>> Any plan to trigger a deprecation warning / report for the installation 
>>> of unload handlers? It might be tricky to find a good balance of useful 
>>> warnings without being too spammy.
>>>
>>>
>>> Permission policy will do this as is with a console warning and 
>>> Reporting-API if you attempt to install a handler that is disallowed by 
>>> policy.
>>>  
>>>
>>>
>>> A couple more questions / comments inline:
>>>
>>> On Mon, May 8, 2023 at 7:43 AM Fergal Daly <fer...@chromium.org> wrote:
>>>
>>> Contact emails
>>>
>>> fer...@chromium.org, kenji...@chromium.org
>>>
>>> Explainer
>>>
>>>
>>> https://github.com/fergald/docs/blob/master/explainers/permissions-policy-deprecate-unload.md
>>>
>>> Specification
>>>
>>> https://github.com/whatwg/html/pull/7915
>>>
>>>
>>> This is still marked as draft. Can you get this ready for review? If 
>>> it's blocked only on having a 2nd implementor show support, then I'd be 
>>> fine shipping based on a PR. But we should at least do what we can to 
>>> solicit feedback on the spec change prior to shipping.
>>>
>>>
>>> Yes. There's nothing in the spec change that isn't in the requests for 
>>> positions but since neither of those are supportive yet, I have not asked 
>>> for review of the PR. I'm hopeful that once we have data on use on unload 
>>> in subframe navigations as discussed here 
>>> <https://github.com/mozilla/standards-positions/issues/691#issuecomment-1484997320>
>>>  that 
>>> Mozilla will be supportive. Those metrics are in 113 but based on the data 
>>> from beta, we need to change how we record them.
>>>
>>>
>>> Summary
>>>
>>> A Permission-Policy for creating unload event listeners will be added. 
>>>
>>> Initially, the default policy will be set to allow. From there, Chrome 
>>> will gradually migrate the default policy to deny (i.e. increasingly 
>>> disallow the creation of unload event listeners, eventually reaching a 
>>> state where deny fully becomes the default policy). The ultimate goal 
>>> is to remove support for unload event.
>>>
>>> Blink component
>>>
>>> Blink>PermissionsAPI 
>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EPermissionsAPI>
>>>
>>> Motivation
>>>
>>> The unload event is extremely unreliable. It is ignored in most cases by 
>>> all mobile browsers except Firefox on Android. Furthermore, in Safari, the 
>>> unload event is ignored on both desktop & mobile platforms.
>>>
>>> In the current state, unload is a major BFCache blocker (~18 percentage 
>>> points reduction of hit rate for Chrome).
>>>
>>> The change  will unlock a large fraction of that hit-rate while 
>>> providing an opt-out for those who need more time to migrate. It also sends 
>>> a clear signal that unload should not be used in new development.
>>>
>>> Sidenote: the spec was changed to say that unload should only run if the 
>>> page cannot enter BFCache, which reflects Safari’s behavior, However 
>>> neither Chrome nor Mozilla have implemented this behavior. In Chrome's 
>>> case, we believe that this would suddenly break various sites and would 
>>> make it hard for developers to know if/when unload may run.
>>>
>>>
>>> Initial public proposal
>>>
>>> None
>>>
>>> TAG review
>>>
>>> https://github.com/w3ctag/design-reviews/issues/738
>>>
>>> TAG review status
>>>
>>> Pending
>>>
>>> Risks
>>>
>>> Interoperability and Compatibility
>>>
>>> If no other browsers implement this, there is a risk that devs continue 
>>> to use unload widely and pages malfunction on chrome. However given that 
>>> alternatives to unload exist it seems entirely possible for sites that are 
>>> actively maintained to move off unload.
>>>
>>> Gecko: (
>>> https://github.com/mozilla/standards-positions/issues/691#issuecomment-1484997320)
>>>  
>>> It's possible that pages are depending on `unload` handlers in subframes 
>>> for functionality even without any main frame navigation. We should try to 
>>> understand how common this is before breaking it. It should be possible to 
>>> measure how often subframe unloads fire when the mainframe is not 
>>> navigating. This will give us an upper bound on the size of the problem, - 
>>> Chrome: we have landed code to measure the occurrence of unload in 
>>> different scenarios. We will report back the findings.
>>>
>>> WebKit: https://github.com/WebKit/standards-positions/issues/127
>>>
>>>
>>> From a quick skim, it sounds like WebKit is already happy with their 
>>> tradeoff of not firing unload and doesn't see a need for an API that 
>>> reduces unload further, is that about right? WebKit has mostly shipped 
>>> heuristics here without trying to spec them first, right? In general I'm 
>>> not too concerned 
>>>
>>>
>>> Yes, there's no great upside for them. I believe the situation as 
>>> specced where unload is unpredictable and likely biased is bad for devs and 
>>> is probably skewing data collected via WebKit (and Chrome/Mozilla mobile) 
>>> but nobody is complaining.
>>>
>>> I believe there was support expressed offline for the prospect of 
>>> killing off unload.
>>>  
>>>
>>>
>>> Web developers: Positive (
>>> https://groups.google.com/a/chromium.org/g/bfcache-dev/c/zTIMx7u4uxo/m/-M4IS6LDBgAJ)
>>>  
>>> The web communities we reached out had positive reactions to our proposal 
>>> and we have not heard about any concrete blockers.
>>>
>>> Other signals:
>>>
>>> WebView application risks
>>>
>>> Does this intent deprecate or change behavior of existing APIs, such 
>>> that it has potentially high risk for Android WebView-based applications?
>>>
>>> On WebView, we will introduce the Permissions-Policy but not move the 
>>> default to "deny". BFCache does not work on WebView, so the benefit is 
>>> lower. Meanwhile the risk seems higher as we have far less visibility into 
>>> the HTML being run in WebViews. A roll-out to WebView should be done 
>>> independently and in consultation with the WebView team.
>>>
>>>
>>> Sounds like the right strategy to me, thanks! 
>>>
>>>
>>> Debuggability
>>>
>>> None
>>>
>>> Is this feature fully tested by web-platform-tests 
>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>> ?
>>>
>>> Yes
>>>
>>> Flag name
>>>
>>> None
>>>
>>>
>>> Please put the new policy behind a RuntimeEnabledFeature 
>>> <https://chromium.googlesource.com/chromium/src/+/main/third_party/blink/renderer/platform/RuntimeEnabledFeatures.md>.
>>>  
>>> It's effectively a new API so is required 
>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/flag_guarding_guidelines.md#When-is-a-flag-required>
>>>  
>>> to have a finch killswitch. It sounds to me like it should be unlikely that 
>>> simply adding the new policy could break things, but maybe some scenario is 
>>> possible where we decide breakage in 3p iframes is bad enough to warrant an 
>>> emergency fix?
>>>
>>>
>>> Yes, there will be a flag, maybe more than one. The implementation 
>>> details of rolling this out gradually have not been worked out. See below.
>>>
>>>  
>>>
>>> Requires code in //chrome?
>>>
>>> False
>>>
>>> Estimated milestones
>>>
>>> M115 for availability of Permissions-Policy
>>>
>>> M115 is the earliest we would start to disable unload, however 
>>>
>>>
>>> Is this a typo? Or are you considering disabling the event in the same 
>>> release we first make the permissions policy available?
>>>
>>>
>>> The plan is to make the PP available with a default of enabled and then 
>>> gradually flip the default to disabled. The details are here 
>>> <https://github.com/fergald/docs/blob/master/explainers/permissions-policy-deprecate-unload.md#logistics-of-deprecation>.
>>>  
>>> It's not particularly nice. We have the option to just stop 100% but that 
>>> seems fairly disruptive,
>>>
>>> F
>>>  
>>>
>>>
>>> Link to entry on the Chrome Platform Status
>>>
>>> https://chromestatus.com/feature/5579556305502208
>>>
>>> -- 
>>> You received this message because you are subscribed to the Google 
>>> Groups "blink-dev" group.
>>> To unsubscribe from this group and stop receiving emails from it, send 
>>> an email to blink-dev+...@chromium.org.
>>> To view this discussion on the web visit 
>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHLm7CR6EeL2KmBFyFpYT%3DNPXmTg4roLKV%3D7dRcCE%2BOoGwg%40mail.gmail.com
>>>  
>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHLm7CR6EeL2KmBFyFpYT%3DNPXmTg4roLKV%3D7dRcCE%2BOoGwg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>> .
>>>
>>>
>>>
>>> -- 
>>> Kenji BAHEUX (my how-to <http://balance/kenjibaheux>)
>>> Product Manager - Chrome
>>> Google Japan
>>>
>>> -- 
>>> You received this message because you are subscribed to the Google 
>>> Groups "blink-dev" group.
>>> To unsubscribe from this group and stop receiving emails from it, send 
>>> an email to blink-dev+...@chromium.org.
>>>
>>> To view this discussion on the web visit 
>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/d955dd04-7aac-462a-bd85-d69df8d7d86bn%40chromium.org
>>>  
>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/d955dd04-7aac-462a-bd85-d69df8d7d86bn%40chromium.org?utm_medium=email&utm_source=footer>
>>> .
>>>
>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/c0ea455b-4a0e-429a-ab68-dec68cd92700n%40chromium.org.

Reply via email to