-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Policy: Document Policies #408
Comments
Friendly ping to TAG :) Is there any update on this since the TPAC f2f? |
Sorry we haven't made enough progress here. We'll try to wrap things up in in 2 weeks. |
How does Document-Policy, Require-Document-Policy and Sec-Required-Policy relate to eachother and to the attribute "policy" (used for iframe etc, I assume that is mapped to Document-Policy). I think the explainer should make this clear early on |
Hi @clelland apologies this is taking so long. One poinf of feedback I have is that the explainer could be a bit clearer on the user need. Also: is there anything further on the spec itself? A bit of elaboration on the detail in the explainer. For example, example one talks about performance guardrails. What is a guardrail? The example talks about "documents" and resources, but can we state this example in terms of (for example) "a commercial web site embeds ads from different 3rd parties and wants to ensure an overall good performance for the user so makes use of this feature policy to... xyz" - basically making it more clear what we aare talking about. |
Some things are not very clear in the explainer, like "associated flag, requires-acknowledgement". What is an associated flag? I guess it is not a header as it is lower-case, also probably not an attribute either, so I guess this is part of the value, like "image-compression;bpp=4 requires-acknowledgement" also I believe the US spelling of "acknowledgment" is without the latter e |
Thanks for taking a look -- I'll see if I can update the explainer. Some of the more formal bits can probably be removed now, since they're covered in the actual spec text. To answer the questions here in advance of that:
Essentially, if there is a minimum policy required (in most cases there won't be, unless
|
I think it would be nice if the spec was a bit clearer on what are request and response headers - like you could group them in different sections. Also as |
I think the specification could use more examples, for instance I have trouble understanding parts like the requires-acknowlegment:
|
Consider adding an example with deeper (more than one level) nesting in the section on Deeper Nesting. It was unclear if the Perhaps the example of your last section can be introduced earlier? |
@kenchris are you suggesting renaming the overall spec from "Document Policy" or just the headers / iframe attribute? (I'm not super attached to the name, if we can find a better one. It's pretty generic as-is) |
For self sandboxing, reporting seems to be a big deal - it is supported by the spec but not mentioned at all in the explainer. I think it should be. I could see an admin setting a document policy for a whole web site, with separate teams (maybe in other countries) creating the actual content that now might be blocked due to such a policy, thus reporting is quite important |
Are other browser vendors interested in this and has it gotten a more wide review? |
Hi @clelland - could you briefly let us know what the latest status is on this and how the TAG can best provide value here? |
Hi @torgo, Regarding the spec and explainer:
Regarding implementation status:
Regarding interest:
For TAG:
|
Thanks @clelland we are taking a look at the questions you raised and will endevour to get some thoughts back to you this week. |
Since there is already a permissions API, as long as the naming (of the permissions being queried) is consistent it feels like extending functionality that is missing on that end is more sensible. (if there is any - if it's just for querying then that's already covered?) (Also noticed the same point was brought up in the issue - should I continue there?) |
Regarding the naming - we've discussed in breakout and we don't have a better idea. However, we agree the current naming is not very self-descriptive and therefore could be confusing to developers who want to figure out what this does and how they can use this (though it does follow on from the header). We recommend you do some user-research with developers - explaining what it is and getting feedback. Regarding the mechanism, we don't see any issues with the CSP-based approach. |
This sounds like a reasonable plan forward. (We are a bit afraid of having a mechanism that doesn't cover a use case when we actually have one - we have made these mistakes in the past.) |
Thanks for the feedback!
This sounds more appropriate for Permissions Policy (where the point was definitely brought up) -- the features covered by that mechanism are mostly suitable for inclusion in The configuration space of Document Policy features may be more complex, involving at a minimum floats, ints and bools for a given configuration point. An API would probably answer questions like "what was the (minimum) required policy on this document?", "what is the current policy for this configuration point?", "If I create an iframe like this, what will its required policy be?" -- I don't know if the permissions API is suited for that.
I'll see what I can do along those lines, thanks!
That's great to hear 😄
Sounds good, thanks 👍 I'll see about removing that from the spec until there is a clear use case. |
Thanks for taking the time to discuss this with us! We'll close this for now and revisit when the spec is closer to it's final shape. |
こんにちはTAG!
I'm requesting a TAG review of:
Further details:
You should also know that the initial Feature Policy spec, which was reviewed previously (#159) by TAG, can be simplified with the adoption of Document Policies. The goal is to constrain it to just those features which are best served by the "allowed at top-level, delegate to cross-origin frames" model, and focus it tightly on that use case.
You should also also know that this explainer is the result of discussions which were also previously noted by TAG in #341.
This request has been updated (2020-12-08) to reflect the new repository which was opened in WICG for Document Policy, as a result of w3c/webappsec-permissions-policy#411.
We'd prefer the TAG provide feedback as (please select one):
The text was updated successfully, but these errors were encountered: