Please also make sure to complete all of the other shipping gate reviews <https://groups.google.com/a/chromium.org/g/blink-dev/c/bqvB1oap0Yc/m/YlO8DEHgAQAJ> .
Thanks! Chris On Sat, Sep 16, 2023 at 5:01 AM Vladimir Levin <vmp...@chromium.org> wrote: > > > On Sat, Sep 16, 2023 at 7:14 AM Yoav Weiss <yoavwe...@chromium.org> wrote: > >> Thanks for your answers Fergal. Now it's my turn to apologize for the >> late reply.. >> >> My main concern is with pages that will not revoke cookies on the >> client, but do so on the server. >> Such pages will not reveal sensitive information with a regular history >> navigation (as the server will no longer provide that info), but >> would provide it after a BFCache navigation. >> >> I agree it's very hard to know when this is happening. One experiment >> that might shed some light on this could be one where we store e.g. hashes >> such pages' HTML/JSON resources instead of BFCaching them, and then >> comparing those with the actual HTML/JSON downloaded in cases where the >> user performs a history navigation. Essentially, I think we could compare >> the would-be BFCache navigation with the equivalent history navigation, in >> order to get a sense of the risk. Ideally, we could then collect a list of >> origins/URLs where such discrepancies are happening, and deep dive into a >> sample of them, to estimate the number of cases with actual user risk (vs. >> cases where the page just randomly changed over the timeout's period, which >> are not scary) >> >> On Mon, Sep 11, 2023 at 12:32 PM Vladimir Levin <vmp...@chromium.org> >> wrote: >> >>> >>> >>> On Mon, Sep 11, 2023 at 8:46 AM 'Fergal Daly' via blink-dev < >>> blink-dev@chromium.org> wrote: >>> >>>> >>>> >>>> On Fri, 8 Sept 2023 at 02:21, Vladimir Levin <vmp...@chromium.org> >>>> wrote: >>>> >>>>> This is potentially a naive question, since I'm not familiar with all >>>>> of the CC headers, but how would the following situation work (or rather >>>>> how is this meant to work?): >>>>> >>>>> I have an "overview" page that lists some items that come from a >>>>> database. This page has an input box with a button to add a new item. The >>>>> way the button works is it POSTs to the same page to add an entry into >>>>> some >>>>> database, and then redirects to a new "details" page. The "overview" page >>>>> also currently sends CCNS, so that when the user clicks back from the >>>>> "details" page, they see an updated list which was re-fetched from the >>>>> server. Without CCNS, going back hits BFCache and the list is not up to >>>>> date. >>>>> >>>> >>>> That seems correct and is a problem with BFCache in general. E.g. you >>>> hit back and your shopping cart has the wrong number of items. >>>> >>>> >>>>> Is there a simple solution to this if CCNS doesn't prevent BFCache? >>>>> >>>> >>>> The one-size-fits-all solutions is something like >>>> >>>> addEventListener("pageshow", e => { >>>> if (e.persisted) { >>>> document.body.innerHTML = ""; >>>> location.reload(); >>>> } >>>> }) >>>> >>> >>>> Which is not great for users >>>> >>> >> Is this a pattern we want to recommend? What would be the performance >> implications if this pattern becomes common? >> > > I would be concerned if we recommend this particular snippet as a > solution. The visual behavior of CCNS and this snippet are not the same, > even if you ignore performance. > Compare: > > https://rocky-merciful-creek.glitch.me/nostore/one.html?delay=1000&nostore=1 > > and: > > https://rocky-merciful-creek.glitch.me/nostore/one.html?delay=1000&nostore=0 > > Both these sites have a 1000ms server delay. In the first case, where we > use CCNS, when you go back, the delay is spent looking at a page before > navigation happens. In the latter case, where we use the snippet, we are > looking at a blank page that reloads. > > I understand the fact that CCNS is preventing a lot of BFCache usage and > appreciate the desire to fix this _in cases that are abusing it_. For me, > the problem is that there are use-cases where the situation is not about > cookies or security, where the developer is correctly using CCNS to refresh > the contents of a frequently changing (on the server) page. > > I know this is impossible to measure, but is there a sense / gut feeling > for how large is CCNS use for "non-security, refresh the content" cases? If > it's small enough then recommending app specific script solutions seems ok, > although I think it will also be impossible to measure how many sites > resort to that. > > >> but also not terrible, the time to load will be increased by the duration >>>> of a BFCache restore which is mostly < 100ms and much less on a fast >>>> device. >>>> >>> >>> >>> I suspect that this will defeat things like paint holding. That is, the >>> behavior of non-bfcache load is to typically to show the painted output of >>> the last page while the navigation commits and shows a frame of the new >>> page (within timeout limit). With this script, this will quickly show a >>> blank page (at the speed of BFCache restore + one frame), and then begin >>> the reload(). >>> >>> So although I agree with your timing estimates, I think the behavior >>> would look substantially worse than just a 100ms delay. >>> >>> >>>> >>>> The better UX would be to have a `pageshow` handler that refreshes just >>>> the data that needs refreshing. The difficulty of doing that is heavily >>>> dependent on the site design, >>>> >>> >>> That's a fair point. This seems non-trivial though :) >>> >>> >>> >>>> >>>> F >>>> >>>> >>>>> This is a toy example: >>>>> https://rocky-merciful-creek.glitch.me/nostore/one.html?nostore=1 >>>>> if you click the link and go back, the number changes. If query >>>>> nostore=0 then it doesn't. The query parameter just controls whether CCNS >>>>> is sent >>>>> >>>>> Thanks! >>>>> vmpstr >>>>> >>>>> >>>>> >>>>> On Thu, Sep 7, 2023 at 5:40 AM 'Mingyu Lei' via blink-dev < >>>>> blink-dev@chromium.org> wrote: >>>>> >>>>>> (Not to answer how the 3 minutes was originally decided, but just to >>>>>> share a bit of the context.) >>>>>> >>>>>> The default BFCache timeout was set to 3 minutes on Chrome for a long >>>>>> time. Only after Sep 2022, it was increased to 10 minutes after >>>>>> evaluating >>>>>> the hit rate improvement and other impacts (https://crbug.com/1305878). >>>>>> For CCNS pages, we will follow the old timeout of 3 minutes, or in other >>>>>> words, the changes that increase BFCache timeout from last year won't be >>>>>> applied to CCNS pages. >>>>>> >>>>>> >>>>>> On Thu, Sep 7, 2023 at 12:21 AM Daniel Bratell <bratel...@gmail.com> >>>>>> wrote: >>>>>> >>>>>>> Thanks for your answers. I think we are on the same page since I too >>>>>>> consider this to be of high value to users. The difference in perceived >>>>>>> performance is so large that I understand that it is worth adding some >>>>>>> magic for. >>>>>>> >>>>>>> On the other hand, as you also know, there is a risk and I want to >>>>>>> be sure that it is fully understood. You have mentioned a shorter >>>>>>> timeout a >>>>>>> couple of times, and the explainer says it will be 3 minutes instead of >>>>>>> the >>>>>>> default 10 minute cache timeout. I'm well aware of sites that time out >>>>>>> authentications server side after a couple of minutes of inactivity and >>>>>>> I >>>>>>> guess 3 would be in the same ball park. Did you pick that particular >>>>>>> number >>>>>>> for any particular reason. Is it the lowest number that still gives any >>>>>>> benefits? >>>>>>> >>>>>>> /Daniel >>>>>>> On 2023-09-01 10:05, 'Fergal Daly' via blink-dev wrote: >>>>>>> >>>>>>> Sorry for the slow reply, I've had to focus on some other things in >>>>>>> the last month. The reply below covers a few overlapping topics that >>>>>>> were >>>>>>> brought up in this thread by Yoav Weiss and Daniel Bratell. >>>>>>> >>>>>>> >>>>>>> On Sat, 29 Jul 2023 at 03:03, Mike Taylor <miketa...@chromium.org> >>>>>>> wrote: >>>>>>> >>>>>>>> Thanks for the additional analysis. Another question I have, if a >>>>>>>> site sends: >>>>>>>> >>>>>>>> "Cache-Control: no-cache, no-store, must-revalidate" (copypasta from >>>>>>>> https://stackoverflow.com/a/2068407), >>>>>>>> would it be treated differently as "Cache-Control: no-store"? I'm >>>>>>>> trying to think of signals that might be useful as >>>>>>>> heuristics for "no seriously don't ever cache this"... >>>>>>>> >>>>>>>> >>>>>>> We would prefer not to do this and other browsers are in agreement >>>>>>> <https://github.com/whatwg/html/issues/5744>. If we give any kind >>>>>>> of simple header that prevents BFCaching, it will become the wide-spread >>>>>>> stack-exchange-documented way to opt out of BFCache. Any site that truly >>>>>>> cannot tolerate its data entering BFCache and doesn't already fall under >>>>>>> one of our conditions for avoiding BFCache, can erase content in a >>>>>>> `pagehide` handler as they enter BFCache and reload it in a `pageload` >>>>>>> handler if restored. This is pretty simple to do for anyone who truly >>>>>>> needs it >>>>>>> (worst case they trigger a reload from JS when leaving BFCache, >>>>>>> obviously not a good user experience but we have to weight that against >>>>>>> block BFCache for many users) but it still provides a little bit of a >>>>>>> barrier, so hopefully people think twice and instead correctly support >>>>>>> BFCache rather than casually opting out, >>>>>>> >>>>>>> F >>>>>>> >>>>>>> On 7/27/23 9:04 AM, Mingyu Lei wrote: >>>>>>>> >>>>>>>> Hi Mike, >>>>>>>> >>>>>>>> Following our previous response, we would like to share the usage >>>>>>>> data that we have collected from the beta channel. 18.76% of history >>>>>>>> navigations are not restored from BFCache because of the CCNS header >>>>>>>> only. >>>>>>>> The following are the breakdowns: >>>>>>>> >>>>>>>> - No RPC containing CCNS response header: 8.63% >>>>>>>> - *No cookie modification: 6.70%* >>>>>>>> - With non-HttpOnly cookie modifications only: 1.38% >>>>>>>> - With HttpOnly or non-HttpOnly cookie modifications: 0.55% >>>>>>>> - With RPC containing CCNS response header: 10.13% >>>>>>>> - No cookie modification: 1.01% >>>>>>>> - With non-HttpOnly cookie modifications only: 7.86% >>>>>>>> - With HttpOnly or non-HttpOnly cookie modifications: 1.26% >>>>>>>> >>>>>>>> Based on these figures, we will update the proposal to evict the >>>>>>>> BFCache entry with any cookie modification for the current phase. This >>>>>>>> should give us 6.70% improvement in cache hit rate. >>>>>>>> >>>>>>>> We could continue the HttpOnly cookie discussion in the future. >>>>>>>> >>>>>>>> On Sat, Jul 22, 2023 at 12:46 AM Mingyu Lei <le...@google.com> >>>>>>>> wrote: >>>>>>>> >>>>>>>>> Hi Mike, >>>>>>>>> >>>>>>>>> Thanks for the comments. We have discussed the concerns you raised >>>>>>>>> before and please find the replies below. >>>>>>>>> >>>>>>>>> >>>>>>>>>> https://github.com/fergald/explainer-bfcache-ccns/blob/main/README.md#secure-cookies >>>>>>>>>> references "HTTPS-only" cookies, as well as "secure" vs "insecure" >>>>>>>>>> cookies. >>>>>>>>>> By "HTTPS-only", do you mean a cookie that sets the "secure" >>>>>>>>>> attribute >>>>>>>>>> (including "__Secure-" prefixes), _and_ sets "HttpOnly"? Or >>>>>>>>>> something else? >>>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>>> Later in >>>>>>>>>> https://github.com/fergald/explainer-bfcache-ccns/blob/main/README.md#allow-ccns-documents-to-be-bfcached-without-the-api, >>>>>>>>>> the proposal is that CCNS pages are safe to bfcache if no "HTTP-only" >>>>>>>>>> cookies have changed. Are these cookies setting only the "HttpOnly" >>>>>>>>>> attribute, or is this intended to say "HTTPS-only" as above? >>>>>>>>>> >>>>>>>>> >>>>>>>>> The short answer is that we will only monitor HttpOnly cookies, >>>>>>>>> regardless of whether they are secure or not. The terms in the >>>>>>>>> explainer >>>>>>>>> were unclear, and we will fix them. >>>>>>>>> >>>>>>>>> I see that >>>>>>>>>> https://github.com/w3ctag/design-reviews/issues/786#issuecomment-1515742477 >>>>>>>>>> references this work. Did we learn anything from experimentation in >>>>>>>>>> the >>>>>>>>>> wild (not sure if y'all ran an experiment)? >>>>>>>>>> >>>>>>>>>> I'm curious if y'all have looked at stats on the uptake of >>>>>>>>>> secure/httponly cookies vs "non-secure" cookies being set by pages >>>>>>>>>> returned >>>>>>>>>> from RPCs sent with an Authorization header (though I wouldn't be >>>>>>>>>> surprised >>>>>>>>>> if we don't have UMA for that... perhaps just globally would be >>>>>>>>>> useful to >>>>>>>>>> consider). >>>>>>>>>> >>>>>>>>> >>>>>>>>> We are currently conducting a Finch experiment to collect the hit >>>>>>>>> rate on beta, and the data will be available next week. We will share >>>>>>>>> it >>>>>>>>> with you again after we have the data. >>>>>>>>> >>>>>>>>> With that data, we will be able to tell the percentage of page >>>>>>>>> loads that observe HttpOnly cookie changes, any cookie changes, or no >>>>>>>>> cookie changes. There will also be another dimension about whether >>>>>>>>> the page >>>>>>>>> had sent out RPC with CCNS response. There is no pre-existing UMA for >>>>>>>>> this, >>>>>>>>> but we have recorded the reasons why BFCache is not restored. >>>>>>>>> >>>>>>>>> My only concern (which may not be grounded in reality) would be >>>>>>>>>> for sites not following best practices... >>>>>>>>> >>>>>>>>> >>>>>>>>> We expect that there will be cases where pages are restored >>>>>>>>> inappropriately where sites are not following good practice. We don't >>>>>>>>> have >>>>>>>>> an idea of the size of this problem. We will have data from the beta >>>>>>>>> channel soon that will tell us what the difference would be in terms >>>>>>>>> of >>>>>>>>> BFCache hit-rate between *monitoring all cookies* and *only >>>>>>>>> monitoring HttpOnly cookies*. Our thought process looks like this: >>>>>>>>> >>>>>>>>> If *monitoring all cookies* already gives us large hit-rate >>>>>>>>> improvement, *or* the difference between *monitoring all cookies* >>>>>>>>> and *only monitoring HttpOnly cookies* is small, then we are >>>>>>>>> happy to just be conservative and go with *monitoring all cookies*. >>>>>>>>> Otherwise*, we would like to discuss this further. >>>>>>>>> >>>>>>>>> >>>>>>>>> ** "Otherwise" means monitoring all cookies will only give us >>>>>>>>> negligible cache hit-rate improvement, and monitoring HttpOnly >>>>>>>>> cookies will >>>>>>>>> give us a much larger increase.* >>>>>>>>> >>>>>>>>> Thanks, >>>>>>>>> Mingyu >>>>>>>>> >>>>>>>>> On Wed, Jul 12, 2023 at 12:11 AM Mike Taylor < >>>>>>>>> miketa...@chromium.org> wrote: >>>>>>>>> >>>>>>>>>> On 7/11/23 2:19 AM, 'Fergal Daly' via blink-dev wrote: >>>>>>>>>> >>>>>>>>>> [BCC chrome-bfca...@google.com] >>>>>>>>>> >>>>>>>>>> On Tue, 11 Jul 2023 at 15:16, Mingyu Lei <le...@google.com> >>>>>>>>>> wrote: >>>>>>>>>> >>>>>>>>>>> +chrome-bfcache <chrome-bfca...@google.com> >>>>>>>>>>> >>>>>>>>>>> On Tue, Jul 11, 2023 at 1:08 PM Mingyu Lei <le...@google.com> >>>>>>>>>>> wrote: >>>>>>>>>>> >>>>>>>>>>>> Contact emails kenjibah...@chromium.org, fer...@chromium.org, >>>>>>>>>>>> denom...@chromium.org, le...@chromium.org >>>>>>>>>>>> >>>>>>>>>>>> Specification >>>>>>>>>>>> https://github.com/fergald/explainer-bfcache-ccns/blob/main/README.md >>>>>>>>>>>> >>>>>>>>>>>> Design docs >>>>>>>>>>>> https://docs.google.com/document/d/1qX1w6L6laTzpFTh78dvT7wwC1060Z3he2Azp4BAwsUE/edit?usp=sharing >>>>>>>>>>>> >>>>>>>>>>>> https://github.com/fergald/explainer-bfcache-ccns/blob/main/README.md >>>>>>>>>>>> >>>>>>>>>>> This is a really well-written explainer, thank you! >>>>>>>>>> >>>>>>>>>> One point of clarification: >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> https://github.com/fergald/explainer-bfcache-ccns/blob/main/README.md#secure-cookies >>>>>>>>>> references "HTTPS-only" cookies, as well as "secure" vs "insecure" >>>>>>>>>> cookies. >>>>>>>>>> By "HTTPS-only", do you mean a cookie that sets the "secure" >>>>>>>>>> attribute >>>>>>>>>> (including "__Secure-" prefixes), _and_ sets "HttpOnly"? Or >>>>>>>>>> something else? >>>>>>>>>> >>>>>>>>>> Later in >>>>>>>>>> https://github.com/fergald/explainer-bfcache-ccns/blob/main/README.md#allow-ccns-documents-to-be-bfcached-without-the-api, >>>>>>>>>> the proposal is that CCNS pages are safe to bfcache if no "HTTP-only" >>>>>>>>>> cookies have changed. Are these cookies setting only the "HttpOnly" >>>>>>>>>> attribute, or is this intended to say "HTTPS-only" as above? >>>>>>>>>> >>>>>>>>>> Summary >>>>>>>>>>>> >>>>>>>>>>>> A behavior change to safely store (and restore) pages in the >>>>>>>>>>>> Back/Forward Cache despite the presence of a "Cache-control: >>>>>>>>>>>> no-store" HTTP >>>>>>>>>>>> header on HTTPS pages. This would allow pages to enter BFCache and >>>>>>>>>>>> be >>>>>>>>>>>> restored as long as there are no changes to cookies or to RPCs >>>>>>>>>>>> using the >>>>>>>>>>>> `Authorization:` header. >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Blink component UI>Browser>Navigation>BFCache >>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:UI%3EBrowser%3ENavigation%3EBFCache> >>>>>>>>>>>> >>>>>>>>>>>> Search tags bfcache >>>>>>>>>>>> <https://chromestatus.com/features#tags:bfcache> >>>>>>>>>>>> >>>>>>>>>>>> TAG review >>>>>>>>>>>> >>>>>>>>>>> I see that >>>>>>>>>> https://github.com/w3ctag/design-reviews/issues/786#issuecomment-1515742477 >>>>>>>>>> references this work. Did we learn anything from experimentation in >>>>>>>>>> the >>>>>>>>>> wild (not sure if y'all ran an experiment)? >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> TAG review status Not applicable >>>>>>>>>>>> >>>>>>>>>>>> Risks >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Interoperability and Compatibility >>>>>>>>>>>> >>>>>>>>>>> I'm curious if y'all have looked at stats on the uptake of >>>>>>>>>> secure/httponly cookies vs "non-secure" cookies being set by pages >>>>>>>>>> returned >>>>>>>>>> from RPCs sent with an Authorization header (though I wouldn't be >>>>>>>>>> surprised >>>>>>>>>> if we don't have UMA for that... perhaps just globally would be >>>>>>>>>> useful to >>>>>>>>>> consider). >>>>>>>>>> >>>>>>>>>> My only concern (which may not be grounded in reality) would be >>>>>>>>>> for sites not following best practices... >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> *Gecko*: No signal >>>>>>>>>>>> >>>>>>>>>>>> *WebKit*: No signal >>>>>>>>>>>> >>>>>>>>>>> Can we request signals? >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>>> *Web developers*: No signals >>>>>>>>>>>> >>>>>>>>>>>> *Other signals*: >>>>>>>>>>>> >>>>>>>>>>>> WebView application risks >>>>>>>>>>>> >>>>>>>>>>>> Does this intent deprecate or change behavior of existing APIs, >>>>>>>>>>>> such that it has potentially high risk for Android WebView-based >>>>>>>>>>>> applications? >>>>>>>>>>>> >>>>>>>>>>>> None >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Debuggability >>>>>>>>>>>> >>>>>>>>>>>> Will this feature be supported on all six Blink platforms >>>>>>>>>>>> (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)? >>>>>>>>>>>> No >>>>>>>>>>>> >>>>>>>>>>>> BFCache is not supported on WebView, so this change has no >>>>>>>>>>>> impact there. >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Is this feature fully tested by web-platform-tests >>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>>>>>>> ? No >>>>>>>>>>>> >>>>>>>>>>>> Flag name on chrome://flags >>>>>>>>>>>> >>>>>>>>>>>> Finch feature name CacheControlNoStoreEnterBackForwardCache >>>>>>>>>>>> >>>>>>>>>>>> Requires code in //chrome? False >>>>>>>>>>>> >>>>>>>>>>>> Tracking bug >>>>>>>>>>>> https://bugs.chromium.org/p/chromium/issues/detail?id=1228611 >>>>>>>>>>>> >>>>>>>>>>>> Launch bug https://launch.corp.google.com/launch/4251651 >>>>>>>>>>>> >>>>>>>>>>>> Estimated milestones >>>>>>>>>>>> DevTrial on desktop 116 >>>>>>>>>>>> DevTrial on Android 116 >>>>>>>>>>>> >>>>>>>>>>>> Anticipated spec changes >>>>>>>>>>>> >>>>>>>>>>>> Open questions about a feature may be a source of future web >>>>>>>>>>>> compat or interop issues. Please list open issues (e.g. links to >>>>>>>>>>>> known >>>>>>>>>>>> github issues in the project for the feature specification) whose >>>>>>>>>>>> resolution may introduce web compat/interop risk (e.g., changing >>>>>>>>>>>> to naming >>>>>>>>>>>> or structure of the API in a non-backward-compatible way). >>>>>>>>>>>> None >>>>>>>>>>>> >>>>>>>>>>>> Link to entry on the Chrome Platform Status >>>>>>>>>>>> https://chromestatus.com/feature/6705326844805120 >>>>>>>>>>>> >>>>>>>>>>>> Links to previous Intent discussions >>>>>>>>>>>> >>>>>>>>>>>> This intent message was generated by Chrome Platform Status >>>>>>>>>>>> <https://chromestatus.com/>. >>>>>>>>>>>> >>>>>>>>>>> -- >>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>> Google Groups "blink-dev" group. >>>>>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>>>>> send an email to blink-dev+unsubscr...@chromium.org. >>>>>>>>>> To view this discussion on the web visit >>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHLkbL7vmubNOsrA2PKngz4xeV%3DXyuLN73oS4XBea50Xe9A%40mail.gmail.com >>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHLkbL7vmubNOsrA2PKngz4xeV%3DXyuLN73oS4XBea50Xe9A%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>>>>> . >>>>>>>>>> >>>>>>>>>> -- >>>>>>> You received this message because you are subscribed to the Google >>>>>>> Groups "blink-dev" group. >>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>> send an email to blink-dev+unsubscr...@chromium.org. >>>>>>> To view this discussion on the web visit >>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHL%3D0vS96LyxmMgf7C7U93FudaP6k7OLX0MKq5jdW5fNZzA%40mail.gmail.com >>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHL%3D0vS96LyxmMgf7C7U93FudaP6k7OLX0MKq5jdW5fNZzA%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>>> . >>>>>>> >>>>>>> -- >>>>>> You received this message because you are subscribed to the Google >>>>>> Groups "blink-dev" group. >>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>> send an email to blink-dev+unsubscr...@chromium.org. >>>>>> To view this discussion on the web visit >>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAN_fHtmo4p9pYZ3HNGqped8MCBfTWXuNd_VC%3DoV4PHEVi73W%3DA%40mail.gmail.com >>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAN_fHtmo4p9pYZ3HNGqped8MCBfTWXuNd_VC%3DoV4PHEVi73W%3DA%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>>>> . >>>>>> >>>>> -- >>>> You received this message because you are subscribed to the Google >>>> Groups "blink-dev" group. >>>> To unsubscribe from this group and stop receiving emails from it, send >>>> an email to blink-dev+unsubscr...@chromium.org. >>>> To view this discussion on the web visit >>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHLmW2XCFC1d61x1r%2B1c8z_PqoukKOs0EDgDct9cPvRc4eQ%40mail.gmail.com >>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAozHLmW2XCFC1d61x1r%2B1c8z_PqoukKOs0EDgDct9cPvRc4eQ%40mail.gmail.com?utm_medium=email&utm_source=footer> >>>> . >>>> >>> -- >>> You received this message because you are subscribed to the Google >>> Groups "blink-dev" group. >>> To unsubscribe from this group and stop receiving emails from it, send >>> an email to blink-dev+unsubscr...@chromium.org. >>> To view this discussion on the web visit >>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADsXd2O%3DgcdgvJdsCJmP6oG6qf4k0hXM4UePqzGH1ZfQZDMEZg%40mail.gmail.com >>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADsXd2O%3DgcdgvJdsCJmP6oG6qf4k0hXM4UePqzGH1ZfQZDMEZg%40mail.gmail.com?utm_medium=email&utm_source=footer> >>> . >>> >> -- >> You received this message because you are subscribed to the Google Groups >> "blink-dev" group. >> To unsubscribe from this group and stop receiving emails from it, send an >> email to blink-dev+unsubscr...@chromium.org. >> To view this discussion on the web visit >> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfXTPGWGogayj_ohBcq4kmKYwUetrmOtNH%3DzVLRzjnn%2BRg%40mail.gmail.com >> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfXTPGWGogayj_ohBcq4kmKYwUetrmOtNH%3DzVLRzjnn%2BRg%40mail.gmail.com?utm_medium=email&utm_source=footer> >> . >> > -- > You received this message because you are subscribed to the Google Groups > "blink-dev" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to blink-dev+unsubscr...@chromium.org. > To view this discussion on the web visit > https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADsXd2MNvQL%2BCUUbYa2bfN0JYPxrd9JV%3DrY_zR8Nw3kFjGp6bQ%40mail.gmail.com > <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADsXd2MNvQL%2BCUUbYa2bfN0JYPxrd9JV%3DrY_zR8Nw3kFjGp6bQ%40mail.gmail.com?utm_medium=email&utm_source=footer> > . > -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw-W6pFZABA9qXOZ4cDTbzj1TK%3Dx8NdVShZcDr%3D5NzoTAg%40mail.gmail.com.