Following up on this: Now that the new UseCounter <https://chromestatus.com/metrics/feature/timeline/popularity/5459> has made it out to Stable, the portion of pageloads that would be affected by this change is 0.000069%.
The UseCounter <https://chromestatus.com/metrics/feature/timeline/popularity/3311> for `document.requestStorageAccess()` is currently at 0.075%. Same-site cross-origin SAA usage is a strict subset of this, which means 0.00092% of SAA usage would be affected in Chrome. Please LMK if those numbers look acceptable to you. On Friday, March 28, 2025 at 4:27:37 PM UTC-4 Chris Fredrickson wrote: > Thanks Alex (and Vlad), those concerns make sense. > > Re: next steps, I've improved <https://crrev.com/c/6373548> the existing > UMA, but more importantly, I added <https://crrev.com/c/6397807> a > UKM-based UseCounter that will precisely measure the % of pageloads that > would be affected by this change. I will follow up once I have data from > Stable (M136) from that, and know which sites are most likely to experience > breakage. > > I'm reluctant to do a finch'd rollout for this, since this change affects > web platform semantics; a finch rollout for this would make it very hard > for web developers to predict the user agent's behavior, IMO. So the other > options (improving metrics, including UKM to identify affected sites) seem > like the better option to me. > > Talk to you in a month or two (I hope), > Chris > > On Wednesday, March 26, 2025 at 11:27:05 AM UTC-4 Alex Russell wrote: > >> Thanks, Chris. >> >> We discussed briefly at today's API OWNERs, and Vlad and I are in the >> same boat (I think?), which is that we're glad that you were able to >> confirm our understanding of the situation, but the risk continues to look >> high in that light. >> >> There's generally a menu of options in these cases, ranging from adding >> more detailed metrics and waiting for analysis to roll in (which can take >> months), to working with developers and partners to characterise the >> potential for breakage, to spot checks of known-affected sites (or adding >> UKM to detect them), to finch'd rollout. We'd like to understand if any of >> these make sense for this case to reduce the risk profile here. >> >> WDYT? >> >> Best, >> >> Alex >> >> On Friday, March 21, 2025 at 12:39:14 PM UTC-7 Chris Fredrickson wrote: >> >>> Mozilla standards position request: >>> https://github.com/mozilla/standards-positions/issues/1200 >>> WebKit standards position request: >>> https://github.com/WebKit/standards-positions/issues/476 >>> >>> On Wednesday, March 19, 2025 at 4:40:17 PM UTC-4 Chris Fredrickson wrote: >>> >>>> Sorry for the delay, for some reason Alex's message didn't show up in >>>> my inbox! >>>> >>>> *Alex*: >>>> Up to 100% of Storage Access API (SAA) usage could be affected, if we >>>> assume that *every *usage of SAA later involves a cross-origin, >>>> same-site network request that is required to be credentialed. >>>> >>>> However, it's also possible that *none* of the network traffic in the >>>> cross-origin, same-site bucket actually needs to be credentialed, so the >>>> breakage is *somewhere* between 0% and 100% of SAA usage... which is >>>> not very helpful. It's impossible for the browser to measure more >>>> specifically (other than checking the credentials mode), since the browser >>>> can't tell that cookies are required to be present on a given request. >>>> >>>> While writing this I realized that the browser *does *know the >>>> request's credentials mode, so the breakage estimate can at least exclude >>>> the portion of requests that opt out of cookies entirely. I'll update the >>>> metric accordingly; I expect this will reduce the 9% figure a bit. >>>> >>>> *Vlad*: >>>> Not exactly, the upper bound of breakage is 0.08% of pageloads (under >>>> the same assumptions as above). In practice I expect the real figure to be >>>> much lower, as not every such iframe will issue a cross-origin, same-site >>>> request; and of those that do, probably not all of those requests actually >>>> need to be credentialed. >>>> >>>> The 9% figure is the proportion of network traffic that could be >>>> affected from iframes that have called SAA. E.g., if we assume that every >>>> iframe that calls SAA then sends 11 network requests (and one of them is >>>> cross-origin same-site), then about 9% of that traffic falls into the >>>> bucket that's changing in this launch. As that example illustrates, it's >>>> possible that *all* of the 0.08% of pageloads that use SAA are >>>> affected by this launch; it's also possible that only a small fraction are >>>> affected. >>>> >>>> Re: nature of the breakage, the cross-origin same-site subset of >>>> network requests would no longer carry cross-site cookies from an iframe >>>> that has called `document.requestStorageAccess()`, by default. The real >>>> consequences of that could be anything from a completely broken >>>> experience, >>>> to unnoticeable; but since sites use cookies in such a variety of ways, >>>> it's kind of impossible to predict where on that spectrum this will fall. >>>> >>>> Re: vendor signals, yes, I'll do that. >>>> >>>> On Wednesday, March 19, 2025 at 11:23:28 AM UTC-4 Vladimir Levin wrote: >>>> >>>>> Is it a correct reading that that it's roughly 9% of 0.08% of >>>>> pageloads that will be affected? That still seems large. Can you speak to >>>>> the nature of the breakage? Specifically, do the sites that currently use >>>>> it become unusable or is it a milder change from that? >>>>> >>>>> On the process side, do you mind filing vendor signals (Gecko and >>>>> Webkit) for this? >>>>> >>>>> Thanks, >>>>> Vlad >>>>> >>>>> On Monday, March 17, 2025 at 2:28:23 PM UTC-4 Alex Russell wrote: >>>>> >>>>>> Hey Chris, >>>>>> >>>>>> Do you have a sense for what fraction of Storage Access API use (yes, >>>>>> I know it's low) will be impacted by this change? Is there a way to tell? >>>>>> >>>>>> Best, >>>>>> >>>>>> Alex >>>>>> >>>>>> On Wednesday, March 12, 2025 at 9:04:37 AM UTC-7 Chris Fredrickson >>>>>> wrote: >>>>>> >>>>>>> Contact emails >>>>>>> >>>>>>> cfred...@chromium.org >>>>>>> >>>>>>> Explainer >>>>>>> >>>>>>> None >>>>>>> >>>>>>> Specification >>>>>>> >>>>>>> https://github.com/privacycg/storage-access/pull/213 >>>>>>> >>>>>>> Summary >>>>>>> >>>>>>> Adjusts the Storage Access API semantics to strictly follow the Same >>>>>>> Origin Policy, w.r.t. security. I.e., using >>>>>>> document.requestStorageAccess() >>>>>>> in a frame only attaches cookies to requests to the iframe's origin >>>>>>> (not >>>>>>> site) by default. >>>>>>> >>>>>>> Note: the CookiesAllowedForUrls enterprise policy and/or Storage >>>>>>> Access Headers may still be used to unblock cross-site cookies. >>>>>>> >>>>>>> >>>>>>> Blink component >>>>>>> >>>>>>> Blink>StorageAccessAPI >>>>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EStorageAccessAPI%22> >>>>>>> >>>>>>> TAG review >>>>>>> >>>>>>> Not requested since this is a small change to the existing Storage >>>>>>> Access proposal that improves security and has no impact on privacy or >>>>>>> user >>>>>>> experience. >>>>>>> >>>>>>> TAG review status >>>>>>> >>>>>>> N/A >>>>>>> >>>>>>> Risks >>>>>>> >>>>>>> Interoperability and Compatibility >>>>>>> >>>>>>> The Storage Access API specification is imprecise about its >>>>>>> integration with Fetch, and does not define whether same-site, >>>>>>> cross-origin >>>>>>> requests ought to be credentialed after an iframe has used the Storage >>>>>>> Access API. >>>>>>> >>>>>>> Chrome and Firefox both currently include cookies on these same-site >>>>>>> cross-origin requests, so there is some risk to making their behaviors >>>>>>> diverge. We have discussed this with other browser vendors and they >>>>>>> expressed that they were not concerned with Chrome making this change. >>>>>>> >>>>>>> However, the Storage Access API currently has very little usage in >>>>>>> Chrome (0.08% of pageloads). The cross-origin, same-site subset of >>>>>>> usage is >>>>>>> an even smaller portion (9% of network requests from affected >>>>>>> pageloads). >>>>>>> So, the impact of breakage is small regardless. >>>>>>> >>>>>>> Sites that are broken by this can fix themselves using the >>>>>>> recently-shipped Storage Access Headers >>>>>>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/gERgwZfN_-E/m/QIJbT1zUCgAJ> >>>>>>> >>>>>>> feature. >>>>>>> >>>>>>> >>>>>>> Gecko: No signal >>>>>>> >>>>>>> WebKit: No signal >>>>>>> >>>>>>> Web developers: Positive ( >>>>>>> https://github.com/privacycg/storage-access/issues/210#issuecomment-2527687508 >>>>>>> ) >>>>>>> >>>>>>> Other signals: >>>>>>> >>>>>>> WebView application risks >>>>>>> >>>>>>> Does this intent deprecate or change behavior of existing APIs, such >>>>>>> that it has potentially high risk for Android WebView-based >>>>>>> applications? >>>>>>> >>>>>>> None >>>>>>> >>>>>>> >>>>>>> Debuggability >>>>>>> >>>>>>> Cookies (and the reasons why they are included/excluded) are >>>>>>> debuggable via the Network panel in Chrome DevTools. >>>>>>> >>>>>>> >>>>>>> Will this feature be supported on all six Blink platforms (Windows, >>>>>>> Mac, Linux, ChromeOS, Android, and Android WebView)? >>>>>>> >>>>>>> Yes >>>>>>> >>>>>>> Is this feature fully tested by web-platform-tests >>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md> >>>>>>> ? >>>>>>> >>>>>>> Yes >>>>>>> >>>>>>> >>>>>>> https://wpt.fyi/results/storage-access-api/requestStorageAccess-cross-origin-fetch.sub.https.tentative.window.html >>>>>>> >>>>>>> >>>>>>> Flag name on about://flags >>>>>>> >>>>>>> storage-access-api-follows-same-origin-policy >>>>>>> >>>>>>> Finch feature name >>>>>>> >>>>>>> StorageAccessApiFollowsSameOriginPolicy >>>>>>> >>>>>>> Requires code in //chrome? >>>>>>> >>>>>>> False >>>>>>> >>>>>>> Tracking bug >>>>>>> >>>>>>> https://crbug.com/379030052 >>>>>>> >>>>>>> Estimated milestones >>>>>>> >>>>>>> 136 >>>>>>> >>>>>>> >>>>>>> Anticipated spec changes >>>>>>> >>>>>>> None anticipated. >>>>>>> >>>>>>> Link to entry on the Chrome Platform Status >>>>>>> >>>>>>> >>>>>>> https://chromestatus.com/feature/5169937372676096?gate=5134161335287808 >>>>>>> >>>>>>> This intent message was generated by Chrome Platform Status >>>>>>> <https://chromestatus.com/>. >>>>>>> >>>>>>> -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscr...@chromium.org. To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/8344a1ee-3466-47e0-a447-b17924af0c7an%40chromium.org.