Flipping the permission policy default is still a breaking change that
requires some action from the developer to keep unload events, right? If
so, we still want en entry in the /deprecated page so that unmanaged
(vendors/BYOD/outbound) users accessing on-prem deployments have some
mitigation. Kenji and I discussed this case with SAP last week, and that
level of mitigation seemed necessary.

On Mon, Aug 7, 2023 at 3:35 AM Fergal Daly <fer...@google.com> wrote:

>
>
> On Sat, 8 Jul 2023 at 07:55, Brandon Heenan <bhee...@google.com> wrote:
>
>> Hello, I'm chiming in to provide some thoughts from the enterprise
>> perspective.
>>
>> Our goal is to not block forward progress to the web, but to improve the
>> web in an enterprise-friendly way. You shouldn't ever hear me say "you
>> can't do X because it's scary to the enterprise team." You should instead
>> hear "We expect X to be risky, but here are the things we know we can do to
>> make it much less risky."
>>
>> In this case, yes, this is risky for enterprises. We can say this with
>> confidence because we've seen escalations before when we've made changes to
>> unload events (crbug.com/933153,  crbug.com/953228).
>>
>> Kenji and Daisuke have been working with us, and my understanding of the
>> plan is to:
>>
>>    -
>>
>>    Allow developers to opt-in early to the new behavior (unload event
>>    ignored) with a permission policy
>>    -
>>
>>    Communicate the change on chromestatus and the enterprise release
>>    notes (already happening
>>    
>> <https://support.google.com/chrome/a/answer/7679408?sjid=15316582819754370342-NA#skpUnload114>).
>>    We will provide a bug link for customers for feedback in a future release.
>>    -
>>
>>    Reach out to enterprises and developers we expect to be affected
>>    -
>>
>>    Introduce an enterprise policy to allow an IT admin to control unload
>>    event behavior
>>    -
>>
>>    Introduce a flag in chrome://flags/deprecated to allow end users to
>>    control unload event behavior
>>
>>
> I looked into this, I'm not sure this should be a deprecated flag. It
> doesn't really fit the description. Some time in the future when we start
> to fully disable unload, there should be a deprecated flag for unload but
> right now we are just flipping the permission policy default.
>
> Are you OK with just adding a UI entry for the existing flag that controls
> this Permission-Policy rollout (which is named DeprecateUnload but I'm
> happy to rename it)
>
> F
>
>
>>
>>    -
>>
>>    As early as M117, change the default for the policy so that unload
>>    events will be ignored. This is the breaking change, and there's likely to
>>    be friction here. The two escalations mentioned above both resulted in
>>    respins the first time they reached this point. However, this time around,
>>    IT admins will be able to fix their environment immediately with the
>>    enterprise policy, end users will be able to fix themselves with the
>>    deprecation flag, and developers will be able to fix their app with the
>>    permission policy. With those mitigations in place, the risk of requiring 
>> a
>>    respin (or Finch rollback) due to enterprise impact is dramatically
>>    reduced, and this is how we eventually successfully shipped both of those
>>    above escalations.
>>    -
>>
>>    We expect a long transition period after that. By default, the unload
>>    event is ignored, but different stakeholders are able to revert to legacy
>>    behavior. Within enterprise, we expect the enterprise policy to be the 
>> most
>>    useful mitigation, and the deprecation flag is the backup for BYOD or
>>    unmanaged devices. For the above escalations, this migration period was
>>    over a year, and I'm expecting something similar this time.
>>    -
>>
>>    At some point in the future, we expect to remove those mitigations
>>    and remove support for the unload event completely. We don't have any
>>    specific dates for that yet; we will be responsive to the needs of web
>>    stakeholders, enterprise and otherwise.
>>
>> The two escalations I mentioned above were successfully resolved and the
>> changes to not allow popups on page unload and to not allow synchronous
>> XHRs on page unload were shipped. Both of those changes followed
>> essentially the same plan I just laid out above, and so I think it's
>> reasonable to do the same thing here.
>>
>>
>> On Thursday, June 29, 2023 at 7:02:06 AM UTC-7 Rick Byers wrote:
>>
>>> On Thu, Jun 29, 2023 at 1:47 AM Kenji Baheux <kenji...@google.com>
>>> wrote:
>>>
>>>>
>>>> On Thu, Jun 29, 2023 at 1:48 PM Fergal Daly <fer...@google.com> wrote:
>>>>
>>>>> On Thu, 29 Jun 2023 at 01:16, Rick Byers <rby...@chromium.org> wrote:
>>>>>
>>>>>> Hi Fergal,
>>>>>> Thanks for pushing through this contentious and challenging
>>>>>> deprecation. We discussed this in the API owners meeting today and were
>>>>>> worried that this plan seemed likely to be seriously problematic for
>>>>>> enterprises (policy opt-out is helpful, but far from a silver bullet
>>>>>> unfortunately). To what extent have you engaged with them and worked to
>>>>>> follow the enterprise breaking change policy
>>>>>> <https://www.chromium.org/developers/enterprise-changes/>? Our hunch
>>>>>> is that at 1% or 5% we'd get escalations forcing us to abandon this plan.
>>>>>> Of course, if the enterprise team is OK with it, we could always try 
>>>>>> anyway
>>>>>> and see if our hunch is right. It's possible I'm over-indexing on past
>>>>>> experiences like deprecating sync XHR in unload handlers
>>>>>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/LnqwTCiT9Gs/m/tO0IBO4PAwAJ>
>>>>>> and that the enterprise world is different now, but I doubt it :-).
>>>>>>
>>>>>
>>>>> In addition to Daisuke's response... are you concerned about
>>>>> enterprises that are not using fleet management and so cannot use the
>>>>> opt-out? If you think an enterprise policy will not be sufficient, a
>>>>> mitigation for those enterprises would be for us to publish an extension
>>>>> that allows anyone to re-enable unload (for all sites or for specific
>>>>> sites) by injecting the PP:unload header. Are the escalations that can't 
>>>>> be
>>>>> resolved by either a policy or extension?
>>>>>
>>>>
>>>> One extra comment on the extension option (great for desktop).
>>>>
>>>> If you wonder about the mobile BYOD scenarios, where extensions don't
>>>> exist, then we are a bit lucky here because unload is already unreliable on
>>>> mobile. So, it seems extremely unlikely that we'd see mobile enterprise/edu
>>>> products that rely on unload on mobile.
>>>>
>>>> *Rick:* are there specific scenarios / environments that we haven't
>>>> covered?
>>>>
>>>
>>> I'm glad to see the conversation with the enterprise team is further
>>> along than I had realized. Having skip unload events in the release
>>> notes
>>> <https://support.google.com/chrome/a/answer/7679408?sjid=5091298988245423514-NA#skpUnloadEv113>
>>> since M113 is a significant mitigation, sorry I wasn't caught up on the
>>> latest. And yes some sort of user opt-out for BYOD (extension or
>>> chrome::/flags, etc.) seems like an essential mitigation. I defer to the
>>> enterprise team's judgement here, so if they're OK with proceeding then we
>>> shouldn't let my enterprise fears block us. I expect we do need some easy
>>> way for an application to signal that it really does need unload handlers.
>>> Setting a permission policy is likely orders of magnitude easier than
>>> converting essential unload handlers to pagehide and ensuring they're safe
>>> to invoke multiple times.
>>>
>>> The other major constituency potentially impacted are ad networks.
>>> Perhaps the next step should be a 1% finch trial where we can measure
>>> various ad-related metrics? I'd defer to the judgment of the Chrome Ads
>>> team (@Josh Karlin).
>>>
>>> Anyway, I'm personally OK with 1% stable experiments (and whatever else
>>> on dev/beta). But I think we should discussing learnings from such 1%
>>> experiments here publicly before approving a plan to go beyond that.
>>>
>>> In general Yoav and I disagree with the WebKit and Gecko feedback here
>>>>>> and suspect that your original PP default-on proposal is far more likely 
>>>>>> to
>>>>>> be a successful deprecation path for Chrome (and, should they choose to
>>>>>> follow, Edge). I can understand why Firefox and WebKit don't have the 
>>>>>> same
>>>>>> constraints around enterprises and so would choose differently for
>>>>>> themselves. Yoav and I are happy to help in the standards discussions. 
>>>>>> I'm
>>>>>> about to go on vacation for 2 weeks but Yoav said he'd follow up with you
>>>>>> privately to brainstorm next steps. Sound good?
>>>>>>
>>>>>
>>>>> I would love to get moving on PP:unload ASAP no matter what. It's been
>>>>> through OT and is sitting behind a flag with some sites eager to use it.
>>>>> I'm happy to send an I2S for that while we discuss the harder problem. We
>>>>> hope that getting that out there can clear out a large chunk of the 1st-
>>>>> and 3rd-party unload usage,
>>>>>
>>>>
>>>> +1, I'd suggest doing that regardless.
>>>>
>>>> There are a few large sites that have done some legwork on
>>>> unload handlers (theirs and third party partners), and are interested in
>>>> pushing the remaining unload handlers out with PP:unload. Having allies in
>>>> the ecosystem (i.e. extra incentives to migrate), will be helpful going
>>>> forward :)
>>>>
>>>
>>> Yep I think this was Yoav and my primary concern. For chrome to have a
>>> pragmatic and reasonable deprecation path given our user base, we really
>>> need sites adopting such an API. If we're not going to actually ship such
>>> an API then I think we'd have to give up on deprecating unload. I'd support
>>> shipping this API despite the lack of support from WebKit and Gecko.
>>>
>>>
>>>> F
>>>>>
>>>>>
>>>>>>
>>>>>> Rick
>>>>>>
>>>>>>
>>>>>> On Wed, Jun 28, 2023 at 4:07 AM Fergal Daly <fer...@google.com>
>>>>>> wrote:
>>>>>>
>>>>>>> Hi API-owners,
>>>>>>>
>>>>>>>
>>>>>>> I am now asking for permission to go ahead with the following
>>>>>>> concrete unload deprecation plan below.
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>    -
>>>>>>>
>>>>>>>    Tools and outreach
>>>>>>>    -
>>>>>>>
>>>>>>>       M115 Enable `Permission-Policy: unload` (PP:unload) with the
>>>>>>>       default being enabled. This allows sites to opt-in to unload 
>>>>>>> deprecation.
>>>>>>>       -
>>>>>>>
>>>>>>>       Outreach to 1st/3rd parties, to migrate away from using
>>>>>>>       unload and to enforce this with PP:unload.
>>>>>>>       -
>>>>>>>
>>>>>>>    Deprecation
>>>>>>>    -
>>>>>>>
>>>>>>>       M117 change the default for PP:unload so that unload handlers
>>>>>>>       are skipped by default for 1% of page loads
>>>>>>>       -
>>>>>>>
>>>>>>>       M118 increase to 5% of page loads
>>>>>>>       -
>>>>>>>
>>>>>>>       M119 (last of 2023) increase to 10% of page loads
>>>>>>>       -
>>>>>>>
>>>>>>>       Evaluate progress on reduction of the use of unload
>>>>>>>       -
>>>>>>>
>>>>>>>       M120-128 increase +10% gradually to 100% of page loads
>>>>>>>
>>>>>>>
>>>>>>> Enterprise policy would allow opt-out entirely.
>>>>>>>
>>>>>>>
>>>>>>> Obviously, the deprecation timeline is contingent on unload usage
>>>>>>> coming down in response to the earlier steps.
>>>>>>>
>>>>>>> We expect that 10% of page loads will provide a noticeable signal to
>>>>>>> sites that use unload. Also, if we were to just follow the current spec 
>>>>>>> and
>>>>>>> not run unload when we can BFCache (as happens on Clank/Firefox mobile 
>>>>>>> and
>>>>>>> all WebKit) we expect that we would skip 30-40% of unload handlers when 
>>>>>>> the
>>>>>>> main frame navigates.
>>>>>>>
>>>>>>> Decisions:
>>>>>>>
>>>>>>>    -
>>>>>>>
>>>>>>>    Timeline
>>>>>>>    -
>>>>>>>
>>>>>>>    All navigations vs main-frame navigations only
>>>>>>>
>>>>>>>
>>>>>>> Standardising
>>>>>>>
>>>>>>> We have some new data and have had some further discussions with
>>>>>>> browser vendors. There's no consensus. TL;DR WebKit are opposed to any
>>>>>>> Permissions-Policy but support removing unload eventually. Mozilla are
>>>>>>> still discussing.
>>>>>>>
>>>>>>> Both Mozilla
>>>>>>> <https://github.com/mozilla/standards-positions/issues/691> and
>>>>>>> WebKit <https://github.com/WebKit/standards-positions/issues/127>
>>>>>>> were opposed to standardising `Permissions-Policy: unload` (defaulting 
>>>>>>> to
>>>>>>> on) because they worried that a containing frame might selectively 
>>>>>>> disable
>>>>>>> unload handlers in a child frame for malicious purposes (no specific 
>>>>>>> cases
>>>>>>> were discussed).
>>>>>>>
>>>>>>> So we flipped to the idea of having PP:unload with the default being
>>>>>>> disabled. We cannot suddenly do that. We need to roll it out gradually.
>>>>>>> WebKit folks are opposed to this and have suggested
>>>>>>> <https://github.com/WebKit/standards-positions/issues/200#issuecomment-1596385073>
>>>>>>> we do a reverse origin trial instead. If our plan works out, eventually 
>>>>>>> we
>>>>>>> would ROT as the final nail but ROT starting now has downsides for users
>>>>>>> and sites and no upside for the implementer.
>>>>>>>
>>>>>>> Mozilla has so far not been negative
>>>>>>> <https://github.com/mozilla/standards-positions/issues/691> on the
>>>>>>> Permissions-Policy off-by-default approach but they are still 
>>>>>>> discussing.
>>>>>>> They are concerned that disabling unloads when subframes are navigating
>>>>>>> could be a problem. We found that about 1/4 of subframe navigations 
>>>>>>> involve
>>>>>>> an `unload` handler (most seem to involve handlers in cross-site and
>>>>>>> same-site site frames). We don't have examples of sites that rely on
>>>>>>> `unload` handlers in this way, although they probably do exist. 
>>>>>>> Migrating
>>>>>>> to `pageshow` or using PP:unload for these sites should be trivial.
>>>>>>>
>>>>>>> We have the option to say that PP:unload only applies to main frame
>>>>>>> navigations. This would mean these sites would be completely unaffected
>>>>>>> however that has some downsides. It is harder to explain and does not 
>>>>>>> end
>>>>>>> with full removal of `unload`. We would prefer to have this apply to all
>>>>>>> navigations unless we find a good reason not to. If we were to change
>>>>>>> part-way, there would be no breakage. We hope that once we drive down 
>>>>>>> usage
>>>>>>> in 3rd-part iframes with PP:unload that the number of unload handlers
>>>>>>> running in subframe navigations decreases significantly.
>>>>>>>
>>>>>>> Finally there was some discussion
>>>>>>> <https://github.com/w3c/webappsec-permissions-policy/issues/513#issuecomment-1564361739>
>>>>>>> about how Permissions-Policy off-by-default should work. Our current
>>>>>>> version requires every page to set the header and every parent to set 
>>>>>>> the
>>>>>>> iframe `allow` attribute. This is maximally conservative. If at some 
>>>>>>> point
>>>>>>> later on there is agreement to standardise on something less 
>>>>>>> conservative,
>>>>>>> it will not break pages that have already re-enabled `unload`.
>>>>>>>
>>>>>>>
>>>>>>> Overall it seems hard to standardise in advance but if we succeed in
>>>>>>> driving down `unload` usage, other browsers are on-board with removing
>>>>>>> unload. The worst case scenario would be where we implement PP:unload
>>>>>>> (which the others do not agree with) but make no noticeable progress on
>>>>>>> `unload` usage. If that happens we can just go with the currently 
>>>>>>> specced
>>>>>>> behaviour (don't run `unload` if BFCaching is possible) and maybe revert
>>>>>>> the PP:unload,
>>>>>>>
>>>>>>> F
>>>>>>>
>>>>>>> On Tue, 9 May 2023 at 16:01, Fergal Daly <fer...@google.com> wrote:
>>>>>>>
>>>>>>>> On Mon, 8 May 2023 at 17:51, Rick Byers <rby...@chromium.org>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> Hi Fergal,
>>>>>>>>> It's exciting to see this moving forward! Just to clarify, this is
>>>>>>>>> effectively an I2S for the unload permissions-policy, is that right? 
>>>>>>>>> Or are
>>>>>>>>> you also requesting permission to stop firing unload events now too?  
>>>>>>>>> The
>>>>>>>>> latter is going to require some significant compat analysis, but 
>>>>>>>>> could be
>>>>>>>>> greatly informed by the experience of having some top-level sites 
>>>>>>>>> opt-out
>>>>>>>>> of unload for their frame tree.
>>>>>>>>>
>>>>>>>>
>>>>>>>> Thanks.
>>>>>>>>
>>>>>>>> We're not requesting permission to stop firing at this point. It is
>>>>>>>> the far-away end-point.
>>>>>>>>
>>>>>>>>
>>>>>>>>>
>>>>>>>>> Any plan to trigger a deprecation warning / report for the
>>>>>>>>> installation of unload handlers? It might be tricky to find a good 
>>>>>>>>> balance
>>>>>>>>> of useful warnings without being too spammy.
>>>>>>>>>
>>>>>>>>
>>>>>>>> Permission policy will do this as is with a console warning and
>>>>>>>> Reporting-API if you attempt to install a handler that is disallowed by
>>>>>>>> policy.
>>>>>>>>
>>>>>>>>
>>>>>>>>>
>>>>>>>>> A couple more questions / comments inline:
>>>>>>>>>
>>>>>>>>> On Mon, May 8, 2023 at 7:43 AM Fergal Daly <fer...@chromium.org>
>>>>>>>>> wrote:
>>>>>>>>>
>>>>>>>>>> Contact emails
>>>>>>>>>>
>>>>>>>>>> fer...@chromium.org, kenji...@chromium.org
>>>>>>>>>>
>>>>>>>>>> Explainer
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> https://github.com/fergald/docs/blob/master/explainers/permissions-policy-deprecate-unload.md
>>>>>>>>>>
>>>>>>>>>> Specification
>>>>>>>>>>
>>>>>>>>>> https://github.com/whatwg/html/pull/7915
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> This is still marked as draft. Can you get this ready for review?
>>>>>>>>> If it's blocked only on having a 2nd implementor show support, then 
>>>>>>>>> I'd be
>>>>>>>>> fine shipping based on a PR. But we should at least do what we can to
>>>>>>>>> solicit feedback on the spec change prior to shipping.
>>>>>>>>>
>>>>>>>>
>>>>>>>> Yes. There's nothing in the spec change that isn't in the requests
>>>>>>>> for positions but since neither of those are supportive yet, I have not
>>>>>>>> asked for review of the PR. I'm hopeful that once we have data on use 
>>>>>>>> on
>>>>>>>> unload in subframe navigations as discussed here
>>>>>>>> <https://github.com/mozilla/standards-positions/issues/691#issuecomment-1484997320>
>>>>>>>>  that
>>>>>>>> Mozilla will be supportive. Those metrics are in 113 but based on the 
>>>>>>>> data
>>>>>>>> from beta, we need to change how we record them.
>>>>>>>>
>>>>>>>>
>>>>>>>>> Summary
>>>>>>>>>>
>>>>>>>>>> A Permission-Policy for creating unload event listeners will be
>>>>>>>>>> added.
>>>>>>>>>>
>>>>>>>>>> Initially, the default policy will be set to allow. From there,
>>>>>>>>>> Chrome will gradually migrate the default policy to deny (i.e.
>>>>>>>>>> increasingly disallow the creation of unload event listeners, 
>>>>>>>>>> eventually
>>>>>>>>>> reaching a state where deny fully becomes the default policy).
>>>>>>>>>> The ultimate goal is to remove support for unload event.
>>>>>>>>>>
>>>>>>>>>> Blink component
>>>>>>>>>>
>>>>>>>>>> Blink>PermissionsAPI
>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EPermissionsAPI>
>>>>>>>>>>
>>>>>>>>>> Motivation
>>>>>>>>>>
>>>>>>>>>> The unload event is extremely unreliable. It is ignored in most
>>>>>>>>>> cases by all mobile browsers except Firefox on Android. Furthermore, 
>>>>>>>>>> in
>>>>>>>>>> Safari, the unload event is ignored on both desktop & mobile 
>>>>>>>>>> platforms.
>>>>>>>>>>
>>>>>>>>>> In the current state, unload is a major BFCache blocker (~18
>>>>>>>>>> percentage points reduction of hit rate for Chrome).
>>>>>>>>>>
>>>>>>>>>> The change  will unlock a large fraction of that hit-rate while
>>>>>>>>>> providing an opt-out for those who need more time to migrate. It 
>>>>>>>>>> also sends
>>>>>>>>>> a clear signal that unload should not be used in new development.
>>>>>>>>>>
>>>>>>>>>> Sidenote: the spec was changed to say that unload should only run
>>>>>>>>>> if the page cannot enter BFCache, which reflects Safari’s behavior, 
>>>>>>>>>> However
>>>>>>>>>> neither Chrome nor Mozilla have implemented this behavior. In 
>>>>>>>>>> Chrome's
>>>>>>>>>> case, we believe that this would suddenly break various sites and 
>>>>>>>>>> would
>>>>>>>>>> make it hard for developers to know if/when unload may run.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> Initial public proposal
>>>>>>>>>>
>>>>>>>>>> None
>>>>>>>>>>
>>>>>>>>>> TAG review
>>>>>>>>>>
>>>>>>>>>> https://github.com/w3ctag/design-reviews/issues/738
>>>>>>>>>>
>>>>>>>>>> TAG review status
>>>>>>>>>>
>>>>>>>>>> Pending
>>>>>>>>>>
>>>>>>>>>> Risks
>>>>>>>>>>
>>>>>>>>>> Interoperability and Compatibility
>>>>>>>>>>
>>>>>>>>>> If no other browsers implement this, there is a risk that devs
>>>>>>>>>> continue to use unload widely and pages malfunction on chrome. 
>>>>>>>>>> However
>>>>>>>>>> given that alternatives to unload exist it seems entirely possible 
>>>>>>>>>> for
>>>>>>>>>> sites that are actively maintained to move off unload.
>>>>>>>>>>
>>>>>>>>>> Gecko: (
>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/691#issuecomment-1484997320)
>>>>>>>>>> It's possible that pages are depending on `unload` handlers in 
>>>>>>>>>> subframes
>>>>>>>>>> for functionality even without any main frame navigation. We should 
>>>>>>>>>> try to
>>>>>>>>>> understand how common this is before breaking it. It should be 
>>>>>>>>>> possible to
>>>>>>>>>> measure how often subframe unloads fire when the mainframe is not
>>>>>>>>>> navigating. This will give us an upper bound on the size of the 
>>>>>>>>>> problem, -
>>>>>>>>>> Chrome: we have landed code to measure the occurrence of unload in
>>>>>>>>>> different scenarios. We will report back the findings.
>>>>>>>>>>
>>>>>>>>>> WebKit: https://github.com/WebKit/standards-positions/issues/127
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> From a quick skim, it sounds like WebKit is already happy with
>>>>>>>>> their tradeoff of not firing unload and doesn't see a need for an API 
>>>>>>>>> that
>>>>>>>>> reduces unload further, is that about right? WebKit has mostly shipped
>>>>>>>>> heuristics here without trying to spec them first, right? In general 
>>>>>>>>> I'm
>>>>>>>>> not too concerned
>>>>>>>>>
>>>>>>>>
>>>>>>>> Yes, there's no great upside for them. I believe the situation as
>>>>>>>> specced where unload is unpredictable and likely biased is bad for 
>>>>>>>> devs and
>>>>>>>> is probably skewing data collected via WebKit (and Chrome/Mozilla 
>>>>>>>> mobile)
>>>>>>>> but nobody is complaining.
>>>>>>>>
>>>>>>>> I believe there was support expressed offline for the prospect of
>>>>>>>> killing off unload.
>>>>>>>>
>>>>>>>>
>>>>>>>>>
>>>>>>>>> Web developers: Positive (
>>>>>>>>>> https://groups.google.com/a/chromium.org/g/bfcache-dev/c/zTIMx7u4uxo/m/-M4IS6LDBgAJ)
>>>>>>>>>> The web communities we reached out had positive reactions to our 
>>>>>>>>>> proposal
>>>>>>>>>> and we have not heard about any concrete blockers.
>>>>>>>>>>
>>>>>>>>>> Other signals:
>>>>>>>>>>
>>>>>>>>>> WebView application risks
>>>>>>>>>>
>>>>>>>>>> Does this intent deprecate or change behavior of existing APIs,
>>>>>>>>>> such that it has potentially high risk for Android WebView-based
>>>>>>>>>> applications?
>>>>>>>>>>
>>>>>>>>>> On WebView, we will introduce the Permissions-Policy but not move
>>>>>>>>>> the default to "deny". BFCache does not work on WebView, so the 
>>>>>>>>>> benefit is
>>>>>>>>>> lower. Meanwhile the risk seems higher as we have far less 
>>>>>>>>>> visibility into
>>>>>>>>>> the HTML being run in WebViews. A roll-out to WebView should be done
>>>>>>>>>> independently and in consultation with the WebView team.
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Sounds like the right strategy to me, thanks!
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>> Debuggability
>>>>>>>>>>
>>>>>>>>>> None
>>>>>>>>>>
>>>>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>>>>>> ?
>>>>>>>>>>
>>>>>>>>>> Yes
>>>>>>>>>>
>>>>>>>>>> Flag name
>>>>>>>>>>
>>>>>>>>>> None
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Please put the new policy behind a RuntimeEnabledFeature
>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/third_party/blink/renderer/platform/RuntimeEnabledFeatures.md>.
>>>>>>>>> It's effectively a new API so is required
>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/flag_guarding_guidelines.md#When-is-a-flag-required>
>>>>>>>>> to have a finch killswitch. It sounds to me like it should be 
>>>>>>>>> unlikely that
>>>>>>>>> simply adding the new policy could break things, but maybe some 
>>>>>>>>> scenario is
>>>>>>>>> possible where we decide breakage in 3p iframes is bad enough to 
>>>>>>>>> warrant an
>>>>>>>>> emergency fix?
>>>>>>>>>
>>>>>>>>
>>>>>>>> Yes, there will be a flag, maybe more than one. The implementation
>>>>>>>> details of rolling this out gradually have not been worked out. See 
>>>>>>>> below.
>>>>>>>>
>>>>>>>>
>>>>>>>>>
>>>>>>>>>> Requires code in //chrome?
>>>>>>>>>>
>>>>>>>>>> False
>>>>>>>>>>
>>>>>>>>>> Estimated milestones
>>>>>>>>>>
>>>>>>>>>> M115 for availability of Permissions-Policy
>>>>>>>>>>
>>>>>>>>>> M115 is the earliest we would start to disable unload, however
>>>>>>>>>>
>>>>>>>>>
>>>>>>>>> Is this a typo? Or are you considering disabling the event in the
>>>>>>>>> same release we first make the permissions policy available?
>>>>>>>>>
>>>>>>>>
>>>>>>>> The plan is to make the PP available with a default of enabled and
>>>>>>>> then gradually flip the default to disabled. The details are here
>>>>>>>> <https://github.com/fergald/docs/blob/master/explainers/permissions-policy-deprecate-unload.md#logistics-of-deprecation>.
>>>>>>>> It's not particularly nice. We have the option to just stop 100% but 
>>>>>>>> that
>>>>>>>> seems fairly disruptive,
>>>>>>>>
>>>>>>>> F
>>>>>>>>
>>>>>>>>
>>>>>>>>>
>>>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>>>>>
>>>>>>>>>> https://chromestatus.com/feature/5579556305502208
>>>>>>>>>>
>>>>>>>>>> --
>>>>>>>>>> You received this message because you are subscribed to the
>>>>>>>>>> Google Groups "blink-dev" group.
>>>>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>>>>> send an email to blink-dev+...@chromium.org.
>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHLm7CR6EeL2KmBFyFpYT%3DNPXmTg4roLKV%3D7dRcCE%2BOoGwg%40mail.gmail.com
>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHLm7CR6EeL2KmBFyFpYT%3DNPXmTg4roLKV%3D7dRcCE%2BOoGwg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>> .
>>>>>>>>>>
>>>>>>>>>
>>>>
>>>> --
>>>> Kenji BAHEUX (my how-to <http://balance/kenjibaheux>)
>>>> Product Manager - Chrome
>>>> Google Japan
>>>>
>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFKd2qWW%3DNinavDcaJx7ejbgYF5rbZ6-YbC-SAVbWet%2Bj0UQPQ%40mail.gmail.com.

Reply via email to