Thanks Chris and Sam. The spec work and tests demonstrated sufficient progress to extend

LGTM to extend to 135 inclusive (I guess it's a retroactive approval to get 6 milestones instead of the 2 you originally requested).

On 12/17/24 2:52 PM, Chris Fredrickson wrote:
Following up on this - we'd like to amend this I2EE to request an extension for another *3* milestones, to M135, to give ourselves more buffer to resolve any issues. (We understand that a feature may run an origin trial for up to 6 milestones. The first release with this OT was M130.)

We still see shipping in M133 as a possibility, provided that we resolve Mozilla's outstanding concern quickly. We're working to do so and plan to send an I2S for review once it is resolved.

On Wednesday, December 11, 2024 at 3:51:17 PM UTC-5 Sam LeDoux wrote:

    Alex,

    Thank you for the context, and that caveat sounds fair.
    To answer your question, we have not seen much traffic under the
    current OT.

    Best,
    Sam LeDoux

    On Wed, Dec 11, 2024 at 11:33 AM Alex Russell
    <slightly...@chromium.org> wrote:

        Hey Sam,

        Thanks for the updates.

        We discussed this at this morning's API OWNERS meeting, and
        given that there's some renaming risk, it sounds like there's
        support to extend you past the 1 extra milestone you're asking
        for under the caveat that breaking changes (e.g., a renaming)
        be implemented ASAP. Is there much traffic under the current OT?

        Best,

        Alex

        On Wednesday, December 11, 2024 at 5:06:24 AM UTC-8 Sam LeDoux
        wrote:

            Mike,

            Thank you for the response. To address your comments:

                This is trending positive, but
                
https://github.com/mozilla/standards-positions/issues/1084#issuecomment-2471319900
                
<https://github.com/mozilla/standards-positions/issues/1084#issuecomment-2471319900>
 some
                possible renaming. Can we try to sort that out with
                Mozilla before shipping?


            Thank you for pointing this out, we will discuss the
            naming with Mozilla again.

                What feedback have you received so far from participants?

            One piece of feedback we received was that the SAH retry
            behavior with cross-site redirects was unintuitive, which
            led us to create this issue
            <https://github.com/privacycg/storage-access/issues/210>,
            and update the behavior in chromium
            <https://chromium-review.googlesource.com/c/chromium/src/+/6020980> 
accordingly.

                This rationale sounds like using the OT as a
                soft-launch, which isn't great. Do you think your
                partners will learn something in the requested extra 4
                weeks such that you might meaningfully incorporate the
                feedback ahead of a launch? (I think the answer is
                probably no, but I'd love to hear your perspective).


             One of our main motivators for extending the origin trial
            was feedback from a partner that they have not had a
            chance to begin experimenting and would appreciate having
            an additional milestone to do so. An extra 4 weeks may not
            be much time, but having any additional feedback from this
            partner experimenting would be helpful ahead of the launch.

                Can you also comment on substantial progress for the
                following (as relevant), since the original OT?

                  * Draft spec (early draft is ok, but must be
                    spec-like and associated with the appropriate
                    standardization venue, or WICG)

            We have published a spec since the original OT, here
            <https://privacycg.github.io/storage-access-headers/>. A
            link can also be found in the platform status entry.

                  * WPT tests

            We have written a suite of WPTs for Storage Access Headers
            that were recently merged into the wpt repo
            <https://github.com/web-platform-tests/wpt/pull/49502>.

            Best,
            Sam LeDoux

            On Tue, Dec 10, 2024, 8:14 AM Mike Taylor
            <miketa...@chromium.org> wrote:

                On 12/9/24 3:39 PM, 'Sam LeDoux' via blink-dev wrote:


                    Contact emails

                sled...@google.com <mailto:sled...@google.com>,
                johann...@chromium.org
                <mailto:johann...@chromium.org>,
                cfred...@chromium.org <mailto:cfred...@chromium.org>


                        Explainer

                https://github.com/privacycg/storage-access-headers
                <https://github.com/privacycg/storage-access-headers>


                        Specification

                https://privacycg.github.io/storage-access-headers
                <https://privacycg.github.io/storage-access-headers>


                        Summary

                Storage Access Headers offer an alternate way for
                authenticated embeds to opt in for unpartitioned
                cookies. These headers indicate whether embedded
                resources would like to load with permission they
                have already been granted, reducing loads and latency
                overall for these use cases.



                        Blink component

                Blink>StorageAccessAPI
                
<https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3EStorageAccessAPI>


                        Search tags

                storage access api
                <https://chromestatus.com/features#tags:storage%20access%20api>,
                storage access headers
                
<https://chromestatus.com/features#tags:storage%20access%20headers>


                        TAG review

                Not needed, per
                https://github.com/w3ctag/design-reviews/issues/982
                <https://github.com/w3ctag/design-reviews/issues/982>.


                        TAG review status

                Not applicable

                (This should probably be changed to Resolution:
                satisfied, per the above link)


                        Origin Trial Name

                Storage Access Headers


                        Chromium Trial Name

                StorageAccessHeader


                        Origin Trial documentation link

                https://github.com/cfredric/storage-access-headers
                <https://github.com/cfredric/storage-access-headers>


                        WebFeature UseCounter name

                kStorageAccessAPI_requestStorageAccess_Method


                        Risks



                        Interoperability and Compatibility

                This feature poses minor compatibility risk, since
                the Origin header is now included on requests that
                include the "Sec-Fetch-Storage-Access: inactive"
                header - and some servers do not yet properly handle
                the Origin header. However, this risk is low, because:

                * The "inactive" header is only included on clients
                that already block third-party cookies.

                * The presence of the "inactive" header implies that
                the request is cross-site, and that the site in
                question already uses the Storage Access API (which
                is relatively new to the web platform) or that the
                context is an "A > B > A" embedding scenario (which
                are not expected to be common).

                * This feature omits the Origin header from requests
                whose `credentials` mode is not "include".



                Gecko: No signal
                (https://github.com/mozilla/standards-positions/issues/1084
                <https://github.com/mozilla/standards-positions/issues/1084>)

                This is trending positive, but
                
https://github.com/mozilla/standards-positions/issues/1084#issuecomment-2471319900
                
<https://github.com/mozilla/standards-positions/issues/1084#issuecomment-2471319900>
                some possible renaming. Can we try to sort that out
                with Mozilla before shipping?

                WebKit: No signal
                (https://github.com/WebKit/standards-positions/issues/412
                <https://github.com/WebKit/standards-positions/issues/412>)


                Web developers: Positive
                (https://github.com/privacycg/storage-access/issues/130
                <https://github.com/privacycg/storage-access/issues/130>)
                Other feature requests: *
                https://github.com/privacycg/storage-access/issues/170
                <https://github.com/privacycg/storage-access/issues/170>*
                https://github.com/privacycg/storage-access/issues/189
                <https://github.com/privacycg/storage-access/issues/189>


                Other signals:


                        WebView application risks

                None



                        Goals for experimentation

                This experiment would allow us to receive and
                incorporate feedback on the browser's application of
                the `Sec-Fetch-Storage-Access` request header, as
                well as the browser's handling of the
                `Activate-Storage-Access` header before the feature
                is fully launched.

                What feedback have you received so far from participants?


                        Reason this experiment is being extended

                We are currently targeting M133 for the stable launch
                of Storage Access Headers; therefore, we would like
                to extend the Origin Trial to last through M132, as
                partners have expressed a desire to continue
                experimenting with the Storage Access Headers feature
                up until it begins launching to stable.

                This rationale sounds like using the OT as a
                soft-launch, which isn't great. Do you think your
                partners will learn something in the requested extra 4
                weeks such that you might meaningfully incorporate the
                feedback ahead of a launch? (I think the answer is
                probably no, but I'd love to hear your perspective).

                Can you also comment on substantial progress for the
                following (as relevant), since the original OT?

                  * Draft spec (early draft is ok, but must be
                    spec-like and associated with the appropriate
                    standardization venue, or WICG)
                  * TAG review (see exceptions)
                  * bit.ly/blink-signals <http://bit.ly/blink-signals>
                    requests
                  * Outreach for feedback from the spec community
                  * WPT tests



                        Ongoing technical constraints

                None


                        Debuggability

                Currently best debugged via chrome://net-export logs,
                as Chrome DevTools does not show the full chain of
                network events. We may add improved debugging
                capabilities in the future.



                        Will this feature be supported on all six
                        Blink platforms (Windows, Mac, Linux,
                        ChromeOS, Android, and Android WebView)?

                No.

                Supported for Mac, Windows, Linux, Chrome OS, and
                Android.


                        Is this feature fully tested by
                        web-platform-tests
                        
<https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>?

                Yes


                        Flag name on chrome://flags

                #storage-access-headers


                        Requires code in //chrome?

                Yes


                        Tracking bug

                https://issues.chromium.org/issues/332335089
                <https://issues.chromium.org/issues/332335089>


                        Launch bug

                https://launch.corp.google.com/launch/4309903
                <https://launch.corp.google.com/launch/4309903>


                        Estimated milestones

                Shipping on desktop

                        

                133

                Origin trial desktop first

                        

                130

                Origin trial desktop last

                        

                131

                Origin trial extension 1 end milestone

                        

                132

                DevTrial on desktop

                        

                130

                Shipping on Android

                        

                133

                Origin trial Android first

                        

                130

                Origin trial Android last

                        

                131

                DevTrial on Android

                        

                130



                        Link to entry on the Chrome Platform Status

                
https://chromestatus.com/feature/6146353156849664?gate=5788202676518912
                
<https://chromestatus.com/feature/6146353156849664?gate=5788202676518912>


                        Links to previous Intent discussions

                Intent to Prototype:
                
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXyMJzMmpQkZMwQUFGK8-f%3DEerhR2VQbTZephdmE22W%2ByA%40mail.gmail.com
                
<https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXyMJzMmpQkZMwQUFGK8-f%3DEerhR2VQbTZephdmE22W%2ByA%40mail.gmail.com>

                Intent to Experiment:
                
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXyYbxwh%3DPdnigTW80d9jez_835R1SV1bQPDjvk1ra5G4g%40mail.gmail.com
                
<https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXyYbxwh%3DPdnigTW80d9jez_835R1SV1bQPDjvk1ra5G4g%40mail.gmail.com>



                This intent message was generated by Chrome Platform
                Status <https://chromestatus.com/>.
-- You received this message because you are subscribed
                to the Google Groups "blink-dev" group.
                To unsubscribe from this group and stop receiving
                emails from it, send an email to
                blink-dev+unsubscr...@chromium.org
                <mailto:blink-dev+unsubscr...@chromium.org>.
                To view this discussion visit
                
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXxhJJVGame57-BhbW5r_XX2DgRaVcmo1fDu740S7b_hbg%40mail.gmail.com
                
<https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABa1CXxhJJVGame57-BhbW5r_XX2DgRaVcmo1fDu740S7b_hbg%40mail.gmail.com?utm_medium=email&utm_source=footer>.


--
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/16fc9822-8fa4-4134-8ec4-342daf7fadd9%40chromium.org.

Reply via email to