-
Notifications
You must be signed in to change notification settings - Fork 24
specify prerender processing model #63
Comments
I'm similarly concerned about |
The problem you're describing extends beyond prerender. Before we talk about prerender specific mitigations, let's sort out the general case - see my comment in w3c/resource-timing#64 (comment). |
We still need to solve this case, as auxiliary vs top-level matters for secure contexts and |
(note: updated the issue title, since what we're discussing here extends beyond HEIST) The Chrome policy is as follows:
I don't know how/if that aligns with implementations of other browser vendors. Also, Chrome does not fire onload/onerror events for the element. /cc @toddreifsteck @mcmanus
That would break one of the primary motivating use cases.. e.g. a search engine prerendering a high confidence hit for the user. |
Sounds like we need an attribute & matching algorithm so the origin can hint if lax same-site cookies should be used. Related: httpwg/http-extensions#226
I think this should be in the spec for cross-origin prerenders. |
Which origin? The one initiating the prerender? I don't see what that wins you or how the initiator would even know what to set it as. |
I, the initiator, know if I'm going to display the site in an iframe, or in a popup, vs a top-level navigation. Therefore I know how I'd like the page prerendered. |
As far as I can tell, Chrome will only use prerender for top-level navigation. iframed / popup content doesn't leverage prerender. I'm not sure about other browsers. Quick test:
|
Hmm, those kind of limitations should really be defined as part of the standard... |
https://wicg.github.io/nav-speculation/prerendering.html seems like a decent take on this issue. |
Closing this; prerender has moved to https://wicg.github.io/nav-speculation/, and didn't follow this spec's move into HTML. |
Both same-site cookies and
From-Origin
mitigate against HEIST at the root by preventing the requesting origin from getting timing data from a credentialed request to another origin.Both proposals (optionally in same-site cookies) allow the credentialed cross-origin response if it's part of a top-level navigation.
As it's currently specced, it isn't clear where
prerender
fits into that, as it may or may not be top level. Its fetching and matching needs to be specified.Options:
prerender
topreconnect
for cross-origin resources (prefetch
doesn't make sense as a fallback here)as
attribute, which can be something like "top-level" or "auxiliary" - this would indicate how same-site/from-origin should be applied, and when the prerendered document can be matched to a navigationThe text was updated successfully, but these errors were encountered: