On 12/9/24 3:39 PM, 'Sam LeDoux' via blink-dev wrote:


    Contact emails

sled...@google.com <mailto:sled...@google.com>, johann...@chromium.org <mailto:johann...@chromium.org>, cfred...@chromium.org <mailto:cfred...@chromium.org>


        Explainer

https://github.com/privacycg/storage-access-headers <https://github.com/privacycg/storage-access-headers>


        Specification

https://privacycg.github.io/storage-access-headers <https://privacycg.github.io/storage-access-headers>


        Summary

Storage Access Headers offer an alternate way for authenticated embeds to opt in for unpartitioned cookies. These headers indicate whether embedded resources would like to load with permission they have already been granted, reducing loads and latency overall for these use cases.



        Blink component

Blink>StorageAccessAPI <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EStorageAccessAPI>


        Search tags

storage access api <https://chromestatus.com/features#tags:storage%20access%20api>, storage access headers <https://chromestatus.com/features#tags:storage%20access%20headers>


        TAG review

Not needed, per https://github.com/w3ctag/design-reviews/issues/982 <https://github.com/w3ctag/design-reviews/issues/982>.


        TAG review status

Not applicable

(This should probably be changed to Resolution: satisfied, per the above link)


        Origin Trial Name

Storage Access Headers


        Chromium Trial Name

StorageAccessHeader


        Origin Trial documentation link

https://github.com/cfredric/storage-access-headers


        WebFeature UseCounter name

kStorageAccessAPI_requestStorageAccess_Method


        Risks



        Interoperability and Compatibility

This feature poses minor compatibility risk, since the Origin header is now included on requests that include the "Sec-Fetch-Storage-Access: inactive" header - and some servers do not yet properly handle the Origin header. However, this risk is low, because:

* The "inactive" header is only included on clients that already block third-party cookies.

* The presence of the "inactive" header implies that the request is cross-site, and that the site in question already uses the Storage Access API (which is relatively new to the web platform) or that the context is an "A > B > A" embedding scenario (which are not expected to be common).

* This feature omits the Origin header from requests whose `credentials` mode is not "include".



Gecko: No signal (https://github.com/mozilla/standards-positions/issues/1084 <https://github.com/mozilla/standards-positions/issues/1084>)

This is trending positive, but https://github.com/mozilla/standards-positions/issues/1084#issuecomment-2471319900 some possible renaming. Can we try to sort that out with Mozilla before shipping?

WebKit: No signal (https://github.com/WebKit/standards-positions/issues/412 <https://github.com/WebKit/standards-positions/issues/412>)


Web developers: Positive (https://github.com/privacycg/storage-access/issues/130 <https://github.com/privacycg/storage-access/issues/130>) Other feature requests: * https://github.com/privacycg/storage-access/issues/170 <https://github.com/privacycg/storage-access/issues/170>* https://github.com/privacycg/storage-access/issues/189 <https://github.com/privacycg/storage-access/issues/189>


Other signals:


        WebView application risks

None



        Goals for experimentation

This experiment would allow us to receive and incorporate feedback on the browser's application of the `Sec-Fetch-Storage-Access` request header, as well as the browser's handling of the `Activate-Storage-Access` header before the feature is fully launched.

What feedback have you received so far from participants?


        Reason this experiment is being extended

We are currently targeting M133 for the stable launch of Storage Access Headers; therefore, we would like to extend the Origin Trial to last through M132, as partners have expressed a desire to continue experimenting with the Storage Access Headers feature up until it begins launching to stable.

This rationale sounds like using the OT as a soft-launch, which isn't great. Do you think your partners will learn something in the requested extra 4 weeks such that you might meaningfully incorporate the feedback ahead of a launch? (I think the answer is probably no, but I'd love to hear your perspective).

Can you also comment on substantial progress for the following (as relevant), since the original OT?

 * Draft spec (early draft is ok, but must be spec-like and associated
   with the appropriate standardization venue, or WICG)
 * TAG review (see exceptions)
 * bit.ly/blink-signals requests
 * Outreach for feedback from the spec community
 * WPT tests



        Ongoing technical constraints

None


        Debuggability

Currently best debugged via chrome://net-export logs, as Chrome DevTools does not show the full chain of network events. We may add improved debugging capabilities in the future.



        Will this feature be supported on all six Blink platforms
        (Windows, Mac, Linux, ChromeOS, Android, and Android WebView)?

No.

Supported for Mac, Windows, Linux, Chrome OS, and Android.


        Is this feature fully tested by web-platform-tests
        
<https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>?

Yes


        Flag name on chrome://flags

#storage-access-headers


        Requires code in //chrome?

Yes


        Tracking bug

https://issues.chromium.org/issues/332335089 <https://issues.chromium.org/issues/332335089>


        Launch bug

https://launch.corp.google.com/launch/4309903 <https://launch.corp.google.com/launch/4309903>


        Estimated milestones

Shipping on desktop

        

133

Origin trial desktop first

        

130

Origin trial desktop last

        

131

Origin trial extension 1 end milestone

        

132

DevTrial on desktop

        

130

Shipping on Android

        

133

Origin trial Android first

        

130

Origin trial Android last

        

131

DevTrial on Android

        

130



        Link to entry on the Chrome Platform Status

https://chromestatus.com/feature/6146353156849664?gate=5788202676518912 <https://chromestatus.com/feature/6146353156849664?gate=5788202676518912>


        Links to previous Intent discussions

Intent to Prototype: https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXyMJzMmpQkZMwQUFGK8-f%3DEerhR2VQbTZephdmE22W%2ByA%40mail.gmail.com <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXyMJzMmpQkZMwQUFGK8-f%3DEerhR2VQbTZephdmE22W%2ByA%40mail.gmail.com>

Intent to Experiment: https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXyYbxwh%3DPdnigTW80d9jez_835R1SV1bQPDjvk1ra5G4g%40mail.gmail.com <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXyYbxwh%3DPdnigTW80d9jez_835R1SV1bQPDjvk1ra5G4g%40mail.gmail.com>



This intent message was generated by Chrome Platform Status <https://chromestatus.com/>.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXxhJJVGame57-BhbW5r_XX2DgRaVcmo1fDu740S7b_hbg%40mail.gmail.com <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXxhJJVGame57-BhbW5r_XX2DgRaVcmo1fDu740S7b_hbg%40mail.gmail.com?utm_medium=email&utm_source=footer>.

--
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/5d90c94e-830d-4f5f-b7fb-85955b758c9c%40chromium.org.

Reply via email to