LGTM2

On Wednesday, August 6, 2025 at 5:06:29 PM UTC+2 Mike Taylor wrote:

> LGTM1 (sorry for the delay)
> On 5/19/25 2:00 p.m., Chris Fredrickson wrote:
>
> Following up on this: 
>
> Now that the new UseCounter 
> <https://chromestatus.com/metrics/feature/timeline/popularity/5459> has 
> made it out to Stable, the portion of pageloads that would be affected by 
> this change is 0.000069%.
>
> The UseCounter 
> <https://chromestatus.com/metrics/feature/timeline/popularity/3311> for 
> `document.requestStorageAccess()` is currently at 0.075%. Same-site 
> cross-origin SAA usage is a strict subset of this, which means 0.00092% of 
> SAA usage would be affected in Chrome.
>
> Please LMK if those numbers look acceptable to you.
> On Friday, March 28, 2025 at 4:27:37 PM UTC-4 Chris Fredrickson wrote:
>
>> Thanks Alex (and Vlad), those concerns make sense. 
>>
>> Re: next steps, I've improved <https://crrev.com/c/6373548> the existing 
>> UMA, but more importantly, I added <https://crrev.com/c/6397807> a 
>> UKM-based UseCounter that will precisely measure the % of pageloads that 
>> would be affected by this change. I will follow up once I have data from 
>> Stable (M136) from that, and know which sites are most likely to experience 
>> breakage.
>>
>> I'm reluctant to do a finch'd rollout for this, since this change affects 
>> web platform semantics; a finch rollout for this would make it very hard 
>> for web developers to predict the user agent's behavior, IMO. So the other 
>> options (improving metrics, including UKM to identify affected sites) seem 
>> like the better option to me.
>>
>> Talk to you in a month or two (I hope),
>> Chris
>>
>> On Wednesday, March 26, 2025 at 11:27:05 AM UTC-4 Alex Russell wrote:
>>
>>> Thanks, Chris. 
>>>
>>> We discussed briefly at today's API OWNERs, and Vlad and I are in the 
>>> same boat (I think?), which is that we're glad that you were able to 
>>> confirm our understanding of the situation, but the risk continues to look 
>>> high in that light.
>>>
>>> There's generally a menu of options in these cases, ranging from adding 
>>> more detailed metrics and waiting for analysis to roll in (which can take 
>>> months), to working with developers and partners to characterise the 
>>> potential for breakage, to spot checks of known-affected sites (or adding 
>>> UKM to detect them), to finch'd rollout. We'd like to understand if any of 
>>> these make sense for this case to reduce the risk profile here.
>>>
>>> WDYT?
>>>
>>> Best,
>>>
>>> Alex
>>>
>>> On Friday, March 21, 2025 at 12:39:14 PM UTC-7 Chris Fredrickson wrote:
>>>
>>>> Mozilla standards position request: 
>>>> https://github.com/mozilla/standards-positions/issues/1200 
>>>> WebKit standards position request: 
>>>> https://github.com/WebKit/standards-positions/issues/476
>>>>
>>>> On Wednesday, March 19, 2025 at 4:40:17 PM UTC-4 Chris Fredrickson 
>>>> wrote:
>>>>
>>>>> Sorry for the delay, for some reason Alex's message didn't show up in 
>>>>> my inbox! 
>>>>>
>>>>> *Alex*:  
>>>>> Up to 100% of Storage Access API (SAA) usage could be affected, if we 
>>>>> assume that *every *usage of SAA later involves a cross-origin, 
>>>>> same-site network request that is required to be credentialed.
>>>>>
>>>>> However, it's also possible that *none* of the network traffic in the 
>>>>> cross-origin, same-site bucket actually needs to be credentialed, so the 
>>>>> breakage is *somewhere* between 0% and 100% of SAA usage... which is 
>>>>> not very helpful. It's impossible for the browser to measure more 
>>>>> specifically (other than checking the credentials mode), since the 
>>>>> browser 
>>>>> can't tell that cookies are required to be present on a given request.
>>>>>
>>>>> While writing this I realized that the browser *does *know the 
>>>>> request's credentials mode, so the breakage estimate can at least exclude 
>>>>> the portion of requests that opt out of cookies entirely. I'll update the 
>>>>> metric accordingly; I expect this will reduce the 9% figure a bit.
>>>>>
>>>>> *Vlad*:
>>>>> Not exactly, the upper bound of breakage is 0.08% of pageloads (under 
>>>>> the same assumptions as above). In practice I expect the real figure to 
>>>>> be 
>>>>> much lower, as not every such iframe will issue a cross-origin, same-site 
>>>>> request; and of those that do, probably not all of those requests 
>>>>> actually 
>>>>> need to be credentialed.
>>>>>
>>>>> The 9% figure is the proportion of network traffic that could be 
>>>>> affected from iframes that have called SAA. E.g., if we assume that every 
>>>>> iframe that calls SAA then sends 11 network requests (and one of them is 
>>>>> cross-origin same-site), then about 9% of that traffic falls into the 
>>>>> bucket that's changing in this launch. As that example illustrates, it's 
>>>>> possible that *all* of the 0.08% of pageloads that use SAA are 
>>>>> affected by this launch; it's also possible that only a small fraction 
>>>>> are 
>>>>> affected.
>>>>>
>>>>> Re: nature of the breakage, the cross-origin same-site subset of 
>>>>> network requests would no longer carry cross-site cookies from an iframe 
>>>>> that has called `document.requestStorageAccess()`, by default. The real 
>>>>> consequences of that could be anything from a completely broken 
>>>>> experience, 
>>>>> to unnoticeable; but since sites use cookies in such a variety of ways, 
>>>>> it's kind of impossible to predict where on that spectrum this will fall.
>>>>>
>>>>> Re: vendor signals, yes, I'll do that.
>>>>>
>>>>> On Wednesday, March 19, 2025 at 11:23:28 AM UTC-4 Vladimir Levin wrote:
>>>>>
>>>>>> Is it a correct reading that that it's roughly 9% of 0.08% of 
>>>>>> pageloads that will be affected? That still seems large. Can you speak 
>>>>>> to 
>>>>>> the nature of the breakage? Specifically, do the sites that currently 
>>>>>> use 
>>>>>> it become unusable or is it a milder change from that? 
>>>>>>
>>>>>> On the process side, do you mind filing vendor signals (Gecko and 
>>>>>> Webkit) for this?
>>>>>>
>>>>>> Thanks,
>>>>>> Vlad
>>>>>>
>>>>>> On Monday, March 17, 2025 at 2:28:23 PM UTC-4 Alex Russell wrote:
>>>>>>
>>>>>>> Hey Chris, 
>>>>>>>
>>>>>>> Do you have a sense for what fraction of Storage Access API use 
>>>>>>> (yes, I know it's low) will be impacted by this change? Is there a way 
>>>>>>> to 
>>>>>>> tell?
>>>>>>>
>>>>>>> Best,
>>>>>>>
>>>>>>> Alex
>>>>>>>
>>>>>>> On Wednesday, March 12, 2025 at 9:04:37 AM UTC-7 Chris Fredrickson 
>>>>>>> wrote:
>>>>>>>
>>>>>>>> Contact emails 
>>>>>>>>
>>>>>>>> cfred...@chromium.org
>>>>>>>>
>>>>>>>> Explainer 
>>>>>>>>
>>>>>>>> None
>>>>>>>>
>>>>>>>> Specification 
>>>>>>>>
>>>>>>>> https://github.com/privacycg/storage-access/pull/213
>>>>>>>>
>>>>>>>> Summary 
>>>>>>>>
>>>>>>>> Adjusts the Storage Access API semantics to strictly follow the 
>>>>>>>> Same Origin Policy, w.r.t. security. I.e., using 
>>>>>>>> document.requestStorageAccess() in a frame only attaches cookies to 
>>>>>>>> requests to the iframe's origin (not site) by default.
>>>>>>>>
>>>>>>>> Note: the CookiesAllowedForUrls enterprise policy and/or Storage 
>>>>>>>> Access Headers may still be used to unblock cross-site cookies.
>>>>>>>>
>>>>>>>>
>>>>>>>> Blink component 
>>>>>>>>
>>>>>>>> Blink>StorageAccessAPI 
>>>>>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EStorageAccessAPI%22>
>>>>>>>>
>>>>>>>> TAG review 
>>>>>>>>
>>>>>>>> Not requested since this is a small change to the existing Storage 
>>>>>>>> Access proposal that improves security and has no impact on privacy or 
>>>>>>>> user 
>>>>>>>> experience.
>>>>>>>>
>>>>>>>> TAG review status 
>>>>>>>>
>>>>>>>> N/A
>>>>>>>>
>>>>>>>> Risks
>>>>>>>>
>>>>>>>> Interoperability and Compatibility 
>>>>>>>>
>>>>>>>> The Storage Access API specification is imprecise about its 
>>>>>>>> integration with Fetch, and does not define whether same-site, 
>>>>>>>> cross-origin 
>>>>>>>> requests ought to be credentialed after an iframe has used the Storage 
>>>>>>>> Access API.
>>>>>>>>
>>>>>>>> Chrome and Firefox both currently include cookies on these 
>>>>>>>> same-site cross-origin requests, so there is some risk to making their 
>>>>>>>> behaviors diverge. We have discussed this with other browser vendors 
>>>>>>>> and 
>>>>>>>> they expressed that they were not concerned with Chrome making this 
>>>>>>>> change.
>>>>>>>>
>>>>>>>> However, the Storage Access API currently has very little usage in 
>>>>>>>> Chrome (0.08% of pageloads). The cross-origin, same-site subset of 
>>>>>>>> usage is 
>>>>>>>> an even smaller portion (9% of network requests from affected 
>>>>>>>> pageloads). 
>>>>>>>> So, the impact of breakage is small regardless.
>>>>>>>>
>>>>>>>> Sites that are broken by this can fix themselves using the 
>>>>>>>> recently-shipped Storage Access Headers 
>>>>>>>> <https://groups.google.com/a/chromium.org/g/blink-dev/c/gERgwZfN_-E/m/QIJbT1zUCgAJ>
>>>>>>>>  
>>>>>>>> feature.
>>>>>>>>
>>>>>>>>
>>>>>>>> Gecko: No signal
>>>>>>>>
>>>>>>>> WebKit: No signal
>>>>>>>>
>>>>>>>> Web developers: Positive (
>>>>>>>> https://github.com/privacycg/storage-access/issues/210#issuecomment-2527687508
>>>>>>>> )
>>>>>>>>
>>>>>>>> Other signals:
>>>>>>>>
>>>>>>>> WebView application risks 
>>>>>>>>
>>>>>>>> Does this intent deprecate or change behavior of existing APIs, 
>>>>>>>> such that it has potentially high risk for Android WebView-based 
>>>>>>>> applications?
>>>>>>>>
>>>>>>>> None
>>>>>>>>
>>>>>>>>
>>>>>>>> Debuggability 
>>>>>>>>
>>>>>>>> Cookies (and the reasons why they are included/excluded) are 
>>>>>>>> debuggable via the Network panel in Chrome DevTools.
>>>>>>>>
>>>>>>>>
>>>>>>>> Will this feature be supported on all six Blink platforms (Windows, 
>>>>>>>> Mac, Linux, ChromeOS, Android, and Android WebView)? 
>>>>>>>>
>>>>>>>> Yes
>>>>>>>>
>>>>>>>> Is this feature fully tested by web-platform-tests 
>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>>>> ? 
>>>>>>>>
>>>>>>>> Yes
>>>>>>>>
>>>>>>>>
>>>>>>>> https://wpt.fyi/results/storage-access-api/requestStorageAccess-cross-origin-fetch.sub.https.tentative.window.html
>>>>>>>>
>>>>>>>>
>>>>>>>> Flag name on about://flags 
>>>>>>>>
>>>>>>>> storage-access-api-follows-same-origin-policy
>>>>>>>>
>>>>>>>> Finch feature name 
>>>>>>>>
>>>>>>>> StorageAccessApiFollowsSameOriginPolicy
>>>>>>>>
>>>>>>>> Requires code in //chrome? 
>>>>>>>>
>>>>>>>> False
>>>>>>>>
>>>>>>>> Tracking bug 
>>>>>>>>
>>>>>>>> https://crbug.com/379030052
>>>>>>>>
>>>>>>>> Estimated milestones 
>>>>>>>>
>>>>>>>> 136
>>>>>>>>
>>>>>>>>
>>>>>>>> Anticipated spec changes 
>>>>>>>>
>>>>>>>> None anticipated.
>>>>>>>>
>>>>>>>> Link to entry on the Chrome Platform Status 
>>>>>>>>
>>>>>>>>
>>>>>>>> https://chromestatus.com/feature/5169937372676096?gate=5134161335287808
>>>>>>>>
>>>>>>>> This intent message was generated by Chrome Platform Status 
>>>>>>>> <https://chromestatus.com/>.
>>>>>>>>
>>>>>>>> -- 
> You received this message because you are subscribed to the Google Groups 
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an 
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion visit 
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/8344a1ee-3466-47e0-a447-b17924af0c7an%40chromium.org
>  
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/8344a1ee-3466-47e0-a447-b17924af0c7an%40chromium.org?utm_medium=email&utm_source=footer>
> .
>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/cfece196-9d6c-43db-8d83-973cc33eedefn%40chromium.org.

Reply via email to