-
Notifications
You must be signed in to change notification settings - Fork 18
Anonymous iframe. #53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
@yoavweiss Is the developer feedback provided here enough support to move Arthur's repo to WICG? |
@yoavweiss just asked me if I could get the persons above to speak directly here. I will ask them. |
Since SharedArrayBuffer strategy was activated last year, Zoom team has started deploying COEP. |
Thanks for chiming in @deng4437! |
The repo is now live at https://github.com/WICG/anonymous-iframe Happy incubating!! |
Ads doesn't work on COEP sites right now. This is because ads loads and embed cross-origin contents. It takes an slow and expensive industry-wide change to opt in CORP for every resource for ads to continue work. We are looking forward to this workaround to support ads on COEP sites. |
Hi everyone 👋 ! I'm a software engineer working on the WebContainers technology at StackBlitz. For WebContainers, we heavily rely on SharedArrayBuffer and thus have to use cross-origin isolation with StackBlitz uses an iframe to preview the users website next to the code on the same page. Because the top-level website is cross-origin isolated, the iframe itself has to be served with We even received an issue because of this a couple of days ago. And you can easily try it out for yourself by opening hydrogen.new in Firefox. Scrolling down a bit shows that the images of the products can not be loaded because they are loaded from If we could use anonymous iframes here, we could lift the restriction of serving the embedded iframe with |
Thanks for chiming in! That seems like enough support to move the repo over. |
Thanks everyone!
Thanks, but I believe you already did the transfer, don't you? |
I am confused... You indeed did. apologies for the noise |
Uh oh!
There was an error while loading. Please reload this page.
Introduction
Deploying COEP is difficult for some developers, because of third party iframes. Here is the typical scenario:
<iframe>
must also use COEP.Beyond performance, there are additionnal features gated behind the crossOriginIsolated capability: high resolution timers, getViewportMedia, etc...
Deploying COEP is challenging in cases where there's not a single developer involved, but many.
Anonymous iframe gives developers a way to load documents in a third party iframe from a new and ephemeral context, scoped to the current page. In return, the Cross-Origin-Embedder-Policy (COEP) embedding rules can be lifted.
This way, developers using COEP can now embed third party iframes that do not set COEP.
See repository
Links
Feedback
Zoom, StackBlitz, and Google Display Ads are supportive.
For instance, the latter loads ads content in iframes. The content can be served from 3rd parties, which is out of their direct control. It takes an industry-wide change and opt-in every resource for ads to work properly. It seems somewhat unlikely that they'll be able to ensure that all the ads creators will do the work. Implementing Anonymous-iframe would allow all publishers to get out of the SAB reverse origin trial.
Twitter:
Twitter is very close to ship
COEP:credentialless
, modulo patching React and completing a few de-iframing tasks. So they will probably not need anonymous iframe to enable crossOriginIsolation. I will get more detailed feedback soon. For now:+CC @mikewest @camillelamy @annevk @whatwg/cross-origin-isolation
The text was updated successfully, but these errors were encountered: