Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Headers may limit possible Storage Access API policies #18

Closed
sjledoux opened this issue Oct 7, 2024 · 2 comments
Closed

Headers may limit possible Storage Access API policies #18

sjledoux opened this issue Oct 7, 2024 · 2 comments

Comments

@sjledoux
Copy link

sjledoux commented Oct 7, 2024

Taken from this comment:

The Storage Access API is architected such that implementations may differentiate themselves by imposing stricter or more lax policies on sites. Does this feature narrow the window of possible policies? Put another way, could websites misuse this feature such that some policies would fail to work? If this header becomes widely adopted, could browsers find themselves needing to change their policy for compat reasons?

@cfredric
Copy link
Collaborator

CC @jyasskin since he provided the original feedback from the TAG, in case he wants to provide more context.

Does this feature narrow the window of possible policies? Put another way, could websites misuse this feature such that some policies would fail to work? If this header becomes widely adopted, could browsers find themselves needing to change their policy for compat reasons?

This proposal avoids that narrowing as much as possible, while still providing utility to websites. This feature is designed such that websites (still) must request the storage-access permission from the user (after having obtained a user gesture) via JavaScript. Sites cannot assume that "header-only" usage will work, because it won't. User agents therefore have leeway in whether they choose to support these headers, since the site must support the "first-visit" fallback path (via JS) anyway.

Note that if a user agent does not support these headers, or does not support the header-based opt-in, then the non-iframe use case has no general solution in that user agent. This is unavoidable (unless the UA sacrifices security instead), and highlights the usefulness of this feature.

This concern was previously discussed in a weekly PrivacyCG call (minutes).

Tentatively closing, please reopen or leave comments as needed.

@cfredric cfredric closed this as not planned Won't fix, can't repro, duplicate, stale Oct 15, 2024
@jyasskin
Copy link

@hober, do you think this answer addresses the concern?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants