-
Notifications
You must be signed in to change notification settings - Fork 49
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
When should [SecureContext] be used and why? #32
Comments
Didn't we already reach agreement some time ago on hiding for new APIs with "whatever works" for old APIs? That took quite a long time to get to and landed in IDL and such... |
Right, I think this is basically already done: see the (really quite long) discussion in whatwg/webidl#65. In a nutshell, WebIDL defines a Reading over that section again, I think it can be written more clearly; I'll take a pass on it tomorrow to emphasize that hiding the interface is the right thing to do for new features, and that folks should fall back on throwing only in cases where non-secure contexts implies only partial support (I don't know if there are actually any examples of that for upcoming features?). With regard to non-uniformity:
|
No, WebCrypto has not been unified in a way to use |
Is that something we're looking to do? |
@slightlyoff |
@slightlyoff To be clear, Chrome supports the guidance recommended (using |
Great. Thanks for the context! |
Note that the WebCrypto WG did indeed move to For the design principles document y'all are working on, |
Make it all! Let's get this HTTPS cemented. |
Closing, as this seems to have been resolved! |
@travisleithead euhm, the design principles document still says nothing about it? |
Yes, we should provide guidance as noted in #32 (comment). The title and previous content threw me off... |
@dbaron yes the doc should say something about when you should use secure contexts. We probably don't want it on very fine-grained additions. We want to put it on big new things. Where do we draw the line? Bunch of stuff we can agree on and should write down. @hadleybeeman bunch of stuff on this in the security questionnaire |
Worth a look... Long-term, we should make sure these messages are joined up. https://www.w3.org/TR/security-privacy-questionnaire/#secure-contexts |
Should probably also mention that other entry points where we frequently add new features should have the ability to limit to secure contexts. For example, CSS should have the ability to say that certain new properties are limited to secure contexts. |
The patch that actually landed (15e5c17) is somewhat watered-down from the PR (#75) we'd been discussing at length, pointing to yesterday's TAG discussion as simply hitting an impasse. The face-to-face minutes noted read as follows:
Is there any more detail you could provide around that discussion? It would be helpful to know what points y'all found (un)convincing, as that might help us focus discussions in the future. |
Via an issue from @sleevi and @mikewest, it seems we should have uniform advice for spec authors (and an IDL recipe) for how to handle cases where an API is only partially usable, as is the case for Secure Context-only APIs.
@mikewest notes that the platform's behavior is not uniform today. We should catalog and attempt to drive uniformity.
/cc @domenic @torgo
The text was updated successfully, but these errors were encountered: