-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Review request for Feature Policy #159
Comments
One initial comment, based on a quick look, is that I think it might be helpful if the Other and related mechanisms section were a bit clearer. It's not clear to me what some of the prose in it means. But, more importantly, as the number of feature restriction mechanisms increases, the need for clear guidance to future designers of platform features (spec authors and implementors) becomes more important. I expect the TAG is going to need to add a section to our design principles document offering suggestions about which mechanisms should be used in which contexts; we've already had this sort of discussion a number of times, leading to w3ctag/design-principles#41 being filed, but I expect the issue will need to be even broader. So I think it would probably be useful if the authors of this specification were to provide a clearer statement, probably in that section (at least for now, although we might need to put it someplace common eventually), of when they think future features should be added to feature-policy vs. CSP vs. values of the sandbox attribute vs. allow-* attributes on iframe. |
Thanks, @dbaron -- I'll see about cleaning that section up. It's getting a bit dated now, and it certainly would be good to make the intentions clearer, especially wrt. sandbox attributes. @mikewest or @ojanvafai can probably also comment on this, but I think that the eventual goal is to implement most of the sandbox attributes as policy-controlled features (possibly leaving them in sandbox for compatibility, but essentially being syntactic sugar for the same thing) |
Yup, I think we should expose all sandbox things to feature policy. But I also agree with dbaron than we should take it on ourselves to draft a one-pager that outlines the various ways that features can be controlled, with rough guidelines on when to use which, including things from WebIDL like SecureContext. See related chromium thread: https://groups.google.com/a/chromium.org/forum/#!topic/platform-architecture-dev/z3eD8u_qgbk |
Suggest the explainer doc should be in the same repo as the spec… |
Other questions that came up in another brief TAG discussion (some of which are just things we want to understand):
We're going to try to do more in a subgroup. |
Punting to a subgroup disucssion. In particular:
|
Related: #147 |
Thanks for bringing this to TAG review! We're collecting feedback here ahead of opening issues:
|
Closed pending feedback |
Hello TAG!
I'm requesting a TAG review of:
Further details:
You should also know that...
We'd prefer the TAG provide feedback as (please select one):
The text was updated successfully, but these errors were encountered: