LGTM1. Excited to see this happening.

On Monday, September 16, 2024 at 12:23:09 AM UTC-7 Yoav Weiss wrote:

> Contact emailsyoavwe...@chromium.org
>
> Explainer
> https://gist.github.com/yoavweiss/c7b61e97e6f8d207be619f87ab96ead5
>
> Specificationhttps://github.com/whatwg/html/pull/10394
>
> The PR hasn't landed yet, but I believe it is ready to land (% potential 
> nits).
> I'm not aware of any open issues.
>
> Summary
>
> Some origins can contain different applications with different levels of 
> security requirements. In those cases, it can be beneficial to prevent 
> scripts running in one application from being able to open and script pages 
> of another same-origin application. In such cases, it can be beneficial for 
> a document to ensure its opener cannot script it, even if the opener 
> document is a same-origin one. The `noopener-allow-popups` 
> Cross-Origin-Opener-Policy value will allow documents to define that.
>
>
> Blink componentBlink 
> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink>
>
> TAG reviewhttps://github.com/w3ctag/design-reviews/issues/964
>
> TAG review statusIssues addressed
>
> Risks
>
>
> Interoperability and Compatibility
>
> Compatibility risk: As this feature adds a new COOP value, it doesn't run 
> a risk of colliding with existing values. Where we may see some risk is 
> when developers start using this value in ways that would surprise other 
> teams on their origins. (as they would no longer have scripting access to 
> opened documents) I don't expect that to happen often, and if it would it's 
> something that developers would find out at development time. So I don't 
> expect that to impact users. Interoperability risk: WebKit's positive 
> position makes me optimistic that I'd be able to land the feature there 
> <https://github.com/WebKit/WebKit/pull/30344> as well.
>
>
> *Gecko*: No signal (
> https://github.com/mozilla/standards-positions/issues/1037)
>
> *WebKit*: Support (
> https://github.com/WebKit/standards-positions/issues/360)
>
> *Web developers*: No particular signals, other than the fact that Shopify 
> is interested in this.
>
> *Other signals*:
>
> Security
>
> No particular issues: 
> https://gist.github.com/yoavweiss/3cb7283f56717f6dfe6da05009a27a65
>
>
> The main risk is having developers over rely on the protections this would 
> provide. Input from Chrome and Google security folks led to the inclusion 
> of a spec note 
> <https://whatpr.org/html/10394/browsers.html#cross-origin-opener-policies:top-level-browsing-context-6>
>  
> warning developers against it and indicating what else they'd need to do 
> for more holistic isolation of same-origin documents from others.
>
>
> I'm planning to add a similar note to developer-facing docs 
> <https://github.com/mdn/mdn/issues/579>.
>
> WebView application risks
>
> Does this intent deprecate or change behavior of existing APIs, such that 
> it has potentially high risk for Android WebView-based applications?
>
> None
>
>
> Debuggability
>
> None
>
>
> Will this feature be supported on all six Blink platforms (Windows, Mac, 
> Linux, ChromeOS, Android, and Android WebView)?Yes
>
> Is this feature fully tested by web-platform-tests 
> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
> ?Yes
>
>
> https://wpt.fyi/results/html/cross-origin-opener-policy/tentative/noopener/coop-noopener-allow-popups.https.html?label=experimental&label=master&aligned
>
>
> The test doesn't pass on the bots as the feature is disabled using a base 
> feature flag (and no runtime flag).
>
> Flag name on chrome://flagsNone
>
> Finch feature nameCoopNoopenerAllowPopups
>
> Requires code in //chrome?False
>
> Tracking bughttps://issues.chromium.org/issues/344963946
>
> Measurement
> https://chromestatus.com/metrics/feature/timeline/popularity/5029 
> https://chromestatus.com/metrics/feature/timeline/popularity/5030
>
> Estimated milestones
> Shipping on desktop 131
> Shipping on Android 131
> Shipping on WebView 131
>
> Anticipated spec changes
>
> Open questions about a feature may be a source of future web compat or 
> interop issues. Please list open issues (e.g. links to known github issues 
> in the project for the feature specification) whose resolution may 
> introduce web compat/interop risk (e.g., changing to naming or structure of 
> the API in a non-backward-compatible way).
>
>
> No open questions ATM.
>
> Link to entry on the Chrome Platform Status
> https://chromestatus.com/feature/5163293877731328?gate=4905084336209920
>
> Links to previous Intent discussionsIntent to Prototype: 
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOmohSJj33d%3D0B0tNpD0qrYWzygx0i02bWdhbV3aSCgbjS3Ndw%40mail.gmail.com
>
>
> This intent message was generated by Chrome Platform Status 
> <https://chromestatus.com/>.
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/24c89356-98aa-4503-83d1-a015c5ab7f1cn%40chromium.org.

Reply via email to