"Intent to Ship: getInstalledRelatedApps API for Windows"

248 views
Skip to first unread message

Sunggook Chue

unread,
Apr 3, 2020, 10:23:52 PM4/3/20
to blin...@chromium.org, John Jansen, Peter Beverloo, Rayan Kanso

(rename the title).

 

From: Sunggook Chue
Sent: Thursday, April 2, 2020 3:01 PM
To: 'blin...@chromium.org' <blin...@chromium.org>
Cc: John Jansen <John....@microsoft.com>; 'Peter Beverloo' <beve...@google.com>; 'Rayan Kanso' <raya...@google.com>
Subject: RE: Intent To Ship Review Request

 

(copy and paste the doc below)

 

Title:

 

Intent to Ship: getInstalledRelatedApps API for Windows

 

Body:

 

Contact emails

sun...@microsoft.com,

 

Explainer

Contact: raya...@chromium.org

Link to explainer:  https://github.com/WICG/get-installed-related-apps/blob/master/EXPLAINER.md

 

Spec

Link to spec.  https://wicg.github.io/get-installed-related-apps/spec/

 

Summary

The doc is about Windows Desktop implementation of the getInstalledRelatedApps API.  The related docs and processes are already reviewed and signed off during Android Mobile support. 

 

See Link to a tag review: https://github.com/w3ctag/design-reviews/issues/436

 

Windows specific discussion

 

Windows Desktop implementation:

https://drive.google.com/open?id=1eLSHsfWCmc8IpLHye1XvP1ydvP5iMIOONUN6N15ksmE

 

Summary: It uses Windows API that returns server validated Windows modern apps https://docs.microsoft.com/en-us/windows/uwp/launch-resume/web-to-app-linking.  The gIRA apps filter PWA manifest’s related apps list against Windows API returned list.

 

  • It returns an empty list in the Incognito mode.
  • It filters maximum 3 apps in the PWA manifest.
  • It supports only hard coded ‘store’ platform (windows store)
  • It supports only UWP, not a Win32 app.

 

Is this feature supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?

 

Following this I2S, the API will be supported on Windows and Android.

 

It will be supported in other platforms in future.

 

Demo link

If you have a demo page, link to it here.

 

  1. In Win10 desktop
  2. Enable Developer Mode (Settings -> Update And Security -> For developers -> check developer mode)
    1. If you want to real user scenario, you don’t have to do this, just wait a week or two so windows OS get the validation confirmed based on the doc
  1. Install the attached UWP app: https://drive.google.com/open?id=1qQbDDkz3C-9-GW-PRO4gBrYw_Z-TBau8
  2. Start the Chromium with --enable-features=InstalledAppProvider
  3. Visit the site https://edgepwaone.azurewebsites.net/
  4. Click ‘getInstalledRelatedApps’ in the 5. ‘getInstalledRelatedApps’ test.

 

Result: it will show filtered app list that is installed in the machine.

 

Note: if it skip 3 (installing UWP), it will show Notification permission dialog.

 

Risks

Interoperability and Compatibility

DEdge: Positive

Firefox: No resolved position

Safari: No Signals

Web / Framework developers: Positive based on OT feedback

 

Ergonomics

No adverse effects on Chrome performance are expected.

 

Activation

The API can be used immediately when shipped, but developers will need to update their manifest/native apps for the API to work.

 

Is this feature fully tested by web-platform-tests? Link to test suite results from wpt.fyi.

 

The current tests, https://github.com/web-platform-tests/wpt/search?q=getInstalledRelatedApps&unscoped_q=getInstalledRelatedApps, is about checking Javascript API surface and it is appropriate mainly because testing real user scenario is app from the Windows Store, which can’t be done in the WebTest. 

 

Entry on the feature dashboard

https://chromestatus.com/feature/5695378309513216.

 

From: Sunggook Chue
Sent: Wednesday, April 1, 2020 3:45 PM
To: blin...@chromium.org
Cc: John Jansen <John....@microsoft.com>; Peter Beverloo <beve...@google.com>; Rayan Kanso <raya...@google.com>
Subject: Intent To Ship Review Request

 

Hello,

 

Can you review getInstalledRelatedApps’s ‘Intent To Ship’ , which is based on the https://chromestatus.com/feature/5695378309513216.

 

This is Windows OS specific implementation,

Doc: https://docs.google.com/document/d/1oQNbuYm8aYAj1BWN6-JeWIGlgzyLvOvvFFX-7eHgbZU/edit?usp=sharing

 

Thanks,

Sunggook

 

Matt Giuca

unread,
Apr 5, 2020, 7:33:54 PM4/5/20
to Sunggook Chue, blin...@chromium.org, John Jansen, Peter Beverloo, Rayan Kanso
Hi,

Apologies if this feedback is too late in the process, but I'm concerned about the choice of the platform value, "store", which seems way too generic.

From my reading of the document, a Manifest with "platform": "store" is referring specifically to the Microsoft Store. Since the word "store" is part of the branding for virtually all other platforms' installer platforms (e.g., "App Store" (Apple), "Play Store" (Google), "Galaxy Store" (Samsung)), it doesn't make sense for that to be the Manifest value that refers specifically to the Microsoft Store.

I would like to see this changed to another string that properly conveys the Microsoft Store. Suggested values:
  • "microsoft"
  • "ms_store"
  • "microsoft_store"
  • "windows"
  • "win_store"
  • "windows_store"
I would probably pick "ms_store" or "microsoft_store" (over, say, "windows"), based on the precedent that these values refer to the store not the operating system (e.g., on Android, we use "play", not "android").

--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/DM5PR00MB02963F64A6DB5FEC080C90CDA2C70%40DM5PR00MB0296.namprd00.prod.outlook.com.

Manuel Rego Casasnovas

unread,
Apr 6, 2020, 5:52:21 AM4/6/20
to Sunggook Chue, blin...@chromium.org, John Jansen, Peter Beverloo, Rayan Kanso
I'm a bit lost regarding the status of things here.

There was an intent-to-ship for getInstalledRelatedApps for Android by
the end of past year:
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAAe2mZ2DrLn9fiMCwshbQiUoR0jy8c93phG_J%2B3rfYtw9%2BWmDQ%40mail.gmail.com?utm_medium=email&utm_source=footer

It was approved, but I cannot find if it's actually shipping on any release:
* https://www.chromestatus.com/feature/5695378309513216
* https://bugs.chromium.org/p/chromium/issues/detail?id=895854

If I understand this correctly, this intent is to add support for the
same API on Windows. Could you please clarify this?

Also is there any significant difference between both implementations
for Android vs Windows that it's worth highlighting?

Thanks,
Rego

On 03/04/2020 18:49, 'Sunggook Chue' via blink-dev wrote:
> (rename the title).
>
>  
>
> *From:* Sunggook Chue
> *Sent:* Thursday, April 2, 2020 3:01 PM
> *To:* 'blin...@chromium.org' <blin...@chromium.org>
> *Cc:* John Jansen <John....@microsoft.com>; 'Peter Beverloo'
> <beve...@google.com>; 'Rayan Kanso' <raya...@google.com>
> *Subject:* RE: Intent To Ship Review Request
>
>  
>
> (copy and paste the doc below)
>
>  
>
> Title:
>
>  
>
> Intent to Ship: getInstalledRelatedApps API for Windows
>
>  
>
> Body:
>
>  
>
> *Contact emails*
>
> sun...@microsoft.com <mailto:sun...@microsoft.com>,
>
>  
>
> *Explainer*
>
> Contact: raya...@chromium.org <mailto:raya...@chromium.org>
> *Spec*
> *Summary*
>
> The doc is about Windows Desktop implementation of the
> getInstalledRelatedApps API.  The related docs and processes are already
> reviewed and signed off during Android Mobile support. 
>
>  
>
> See Link to a tag review
> <https://github.com/w3ctag/spec-reviews/issues>:
> https://github.com/w3ctag/design-reviews/issues/436
>
>  
>
> *Windows specific discussion*
>
>  
>
> Windows Desktop implementation:
>
> https://drive.google.com/open?id=1eLSHsfWCmc8IpLHye1XvP1ydvP5iMIOONUN6N15ksmE
>
>  
>
> Summary: It uses Windows API that returns server validated Windows
> modern apps
> https://docs.microsoft.com/en-us/windows/uwp/launch-resume/web-to-app-linking
> The gIRA apps filter PWA manifest’s related apps list against Windows
> API returned list.
>
>  
>
> * It returns an empty list in the Incognito mode.
> * It filters maximum 3 apps in the PWA manifest.
> * It supports only hard coded ‘store’ platform (windows store)
> * It supports only UWP, not a Win32 app.
>
>  
>
> *Is this feature supported on all six Blink platforms (Windows, Mac,
> Linux, Chrome OS, Android, and Android WebView)?*
>
>  
>
> Following this I2S, the API will be supported on Windows and Android.
>
>  
>
> It will be supported in other platforms in future.
>
>  
>
> *Demo link*
>
> If you have a demo page, link to it here.
>
>  
>
> 1. In Win10 desktop
> 2. Enable Developer Mode (Settings -> Update And Security -> For
> developers -> check developer mode)
>
> 1. If you want to real user scenario, you don’t have to do this,
> just wait a week or two so windows OS get the validation
> confirmed based on the doc
> <https://docs.microsoft.com/en-us/windows/uwp/launch-resume/web-to-app-linking>
> 2. Install the attached UWP app:
> https://drive.google.com/open?id=1qQbDDkz3C-9-GW-PRO4gBrYw_Z-TBau8
> 3. Start the Chromium with --enable-features=InstalledAppProvider
> 4. Visit the site https://edgepwaone.azurewebsites.net/
> 5. Click ‘getInstalledRelatedApps’ in the 5. ‘getInstalledRelatedApps’
> test.
>
>  
>
> Result: it will show filtered app list that is installed in the machine.
>
>  
>
> Note: if it skip 3 (installing UWP), it will show Notification
> permission dialog.
>
>  
>
> *Risks*
>
> *Interoperability and Compatibility*
>
> DEdge: Positive
>
> Firefox: Noresolved position
> <https://github.com/mozilla/standards-positions/issues/213>
>
> Safari: No Signals
>
> Web / Framework developers: Positive based on OT feedback
>
>  
>
> *Ergonomics*
>
> No adverse effects on Chrome performance are expected.
>
>  
>
> *Activation*
>
> The API can be used immediately when shipped, but developers will need
> to update their manifest/native apps for the API to work.
>
>  
>
> *Is this feature fully tested by **web-platform-tests*
> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>*?
> Link to test suite results from **wpt.fyi* <https://wpt.fyi>*.*
>
>  
>
> The current tests,
> https://github.com/web-platform-tests/wpt/search?q=getInstalledRelatedApps&unscoped_q=getInstalledRelatedApps,
> is about checking Javascript API surface and it is appropriate mainly
> because testing real user scenario is app from the Windows Store, which
> can’t be done in the WebTest. 
>
>  
>
> *Entry on the **feature dashboard* <http://www.chromestatus.com/>
>
> https://chromestatus.com/feature/5695378309513216.
>
>  
>
> *From:* Sunggook Chue
> *Sent:* Wednesday, April 1, 2020 3:45 PM
> *To:* blin...@chromium.org <mailto:blin...@chromium.org>
> *Cc:* John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>>; Peter Beverloo <beve...@google.com
> <mailto:beve...@google.com>>; Rayan Kanso <raya...@google.com
> <mailto:raya...@google.com>>
> *Subject:* Intent To Ship Review Request
>
>  
>
> Hello,
>
>  
>
> Can you review getInstalledRelatedApps’s ‘Intent To Ship’ , which is
> based on the https://chromestatus.com/feature/5695378309513216.
>
>  
>
> This is Windows OS specific implementation,
>
> Doc:
> https://docs.google.com/document/d/1oQNbuYm8aYAj1BWN6-JeWIGlgzyLvOvvFFX-7eHgbZU/edit?usp=sharing
>
>  
>
> Thanks,
>
> Sunggook
>
>  
>
> --
> You received this message because you are subscribed to the Google
> Groups "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to blink-dev+...@chromium.org
> <mailto:blink-dev+...@chromium.org>.
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/DM5PR00MB02963F64A6DB5FEC080C90CDA2C70%40DM5PR00MB0296.namprd00.prod.outlook.com?utm_medium=email&utm_source=footer>.

Rayan Kanso

unread,
Apr 7, 2020, 12:24:30 PM4/7/20
to Sunggook Chue, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo
Hello,

To clarify, yes the API was launched in M80, I've updated the chromestatus entry accordingly.

As for the platform value, I don't have any strong opinions about this. I don't think the use of store is problematic, it can be shared across OSes (like webapp is used to identify installed PWAs). The other potential values LGTM as well.

Thanks,
~Rayan

On Tue, Apr 7, 2020 at 1:17 AM Sunggook Chue <sun...@microsoft.com> wrote:
Hi Manuel,

1. Android ship
- It must be released, Peter/Rayan, can you confirm this?

2. If I understand this correctly, this intent is to add support for the same API on Windows. Could you please clarify this?
- Yes, this is same API for Windows implementation.

3. Also is there any significant difference between both implementations for Android vs Windows that it's worth highlighting?
- The underline validation technology (system API use) are different; Android relies on digital asset (https://developers.google.com/digital-asset-links) of Android technology meanwhile Windows relies on web-to-app link (https://docs.microsoft.com/en-us/windows/uwp/launch-resume/web-to-app-linking) of Windows technology.  Android also supports webapp platform (installed PWA), but Windows not (yet).

Thanks,
Sunggook


-----Original Message-----
From: Manuel Rego Casasnovas <re...@igalia.com>
Sent: Monday, April 6, 2020 2:52 AM
To: Sunggook Chue <sun...@microsoft.com>; blin...@chromium.org
Cc: John Jansen <John....@microsoft.com>; Peter Beverloo <beve...@google.com>; Rayan Kanso <raya...@google.com>
Subject: [EXTERNAL] Re: [blink-dev] "Intent to Ship: getInstalledRelatedApps API for Windows"

I'm a bit lost regarding the status of things here.

There was an intent-to-ship for getInstalledRelatedApps for Android by the end of past year:


It was approved, but I cannot find if it's actually shipping on any release:


If I understand this correctly, this intent is to add support for the same API on Windows. Could you please clarify this?

Also is there any significant difference between both implementations for Android vs Windows that it's worth highlighting?

Thanks,
  Rego

On 03/04/2020 18:49, 'Sunggook Chue' via blink-dev wrote:
> (rename the title).
>
>  
>
> *From:* Sunggook Chue
> *Sent:* Thursday, April 2, 2020 3:01 PM
> *To:* 'blin...@chromium.org' <blin...@chromium.org>
> *Cc:* John Jansen <John....@microsoft.com>; 'Peter Beverloo'
> <beve...@google.com>; 'Rayan Kanso' <raya...@google.com>
> *Subject:* RE: Intent To Ship Review Request
>
>  
>
> (copy and paste the doc below)
>
>  
>
> Title:
>
>  
>
> Intent to Ship: getInstalledRelatedApps API for Windows
>
>  
>
> Body:
>
>  
>
> *Contact emails*
>
> sun...@microsoft.com <mailto:sun...@microsoft.com>,
>
>  
>
> *Explainer*
>
> Contact: raya...@chromium.org <mailto:raya...@chromium.org>
>
> Link to explainer:
>  
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> ub.com%2FWICG%2Fget-installed-related-apps%2Fblob%2Fmaster%2FEXPLAINER
> .md&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d0
> 8d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353973
> 07563&amp;sdata=aBn%2FXVOjacbWBVzc1wcUWxhWy62uAF6gGzI1FslD%2F5U%3D&amp
> ;reserved=0
>
>  
>
> *Spec*
>
> Link to spec. 
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwicg
> .github.io%2Fget-installed-related-apps%2Fspec%2F&amp;data=02%7C01%7Cs
> unggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86
> f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=9oIDGa35
> DVeY7c4xVLsgkFWomdAntQstdjFblTNg5x4%3D&amp;reserved=0

>
>  
>
> *Summary*
>
> The doc is about Windows Desktop implementation of the
> getInstalledRelatedApps API.  The related docs and processes are
> already reviewed and signed off during Android Mobile support.
>
>  
>
> See Link to a tag review

>
>  
>
> *Windows specific discussion*
>
>  
>
> Windows Desktop implementation:
>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> e.google.com%2Fopen%3Fid%3D1eLSHsfWCmc8IpLHye1XvP1ydvP5iMIOONUN6N15ksm
> E&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d
> 7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317
> 563&amp;sdata=D6WSyz4dcnkS2y7QtM5u5KHXEhHqNkMVnZ5XD1%2B0muY%3D&amp;res
> erved=0

>
>  
>
> Summary: It uses Windows API that returns server validated Windows
> modern apps

> The gIRA apps filter PWA manifest’s related apps list against Windows
> API returned list.
>
>  
>
>   * It returns an empty list in the Incognito mode.
>   * It filters maximum 3 apps in the PWA manifest.
>   * It supports only hard coded ‘store’ platform (windows store)
>   * It supports only UWP, not a Win32 app.
>
>  
>
> *Is this feature supported on all six Blink platforms (Windows, Mac,
> Linux, Chrome OS, Android, and Android WebView)?*
>
>  
>
> Following this I2S, the API will be supported on Windows and Android.
>
>  
>
> It will be supported in other platforms in future.
>
>  
>
> *Demo link*
>
> If you have a demo page, link to it here.
>
>  
>
>  1. In Win10 desktop
>  2. Enable Developer Mode (Settings -> Update And Security -> For
>     developers -> check developer mode)
>
>      1. If you want to real user scenario, you don’t have to do this,
>         just wait a week or two so windows OS get the validation
>         confirmed based on the doc
>         
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdoc
> s.microsoft.com%2Fen-us%2Fwindows%2Fuwp%2Flaunch-resume%2Fweb-to-app-l
> inking&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da048
> 1d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353
> 97317563&amp;sdata=jMbVF08fqWtKt%2F9owpBM86N8xrgR6mjaE%2FdOW4bmXvg%3D&
> amp;reserved=0>

>  2. Install the attached UWP app:
>     
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> e.google.com%2Fopen%3Fid%3D1qQbDDkz3C-9-GW-PRO4gBrYw_Z-TBau8&amp;data=
> 02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7
> C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sda
> ta=3f8uOnMkRzZKF4z0MdadT9%2FhWtp9SIi76Knz5g%2BcCB4%3D&amp;reserved=0

>  3. Start the Chromium with --enable-features=InstalledAppProvider
>  4. Visit the site
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fedge
> pwaone.azurewebsites.net%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> %7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47
> %7C1%7C0%7C637217635397317563&amp;sdata=okVqQ1wP7GSAH94DfyRUDFprbOfHij
> jZrhIsmmYtRTI%3D&amp;reserved=0  5. Click ‘getInstalledRelatedApps’ in
> the 5. ‘getInstalledRelatedApps’
>     test.
>
>  
>
> Result: it will show filtered app list that is installed in the machine.
>
>  
>
> Note: if it skip 3 (installing UWP), it will show Notification
> permission dialog.
>
>  
>
> *Risks*
>
> *Interoperability and Compatibility*
>
> DEdge: Positive
>
> Firefox: Noresolved position
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgit
> hub.com%2Fmozilla%2Fstandards-positions%2Fissues%2F213&amp;data=02%7C0
> 1%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f98
> 8bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=bmh
> 1LWcMGSoaqkMjKM%2FnEr55zxWlbEsbFSWT%2FvVHtD8%3D&amp;reserved=0>

>
> Safari: No Signals
>
> Web / Framework developers: Positive based on OT feedback
>
>  
>
> *Ergonomics*
>
> No adverse effects on Chrome performance are expected.
>
>  
>
> *Activation*
>
> The API can be used immediately when shipped, but developers will need
> to update their manifest/native apps for the API to work.
>
>  
>
> *Is this feature fully tested by **web-platform-tests*

> Link to test suite results from **wpt.fyi*
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwpt
> .fyi%2F&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da04
> 81d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635
> 397317563&amp;sdata=uiBlUAaSSckdqknvX2U4oxNR5OUNRlz6QHKDLMgXNqA%3D&amp
> ;reserved=0>*.*
>
>  
>
> The current tests,
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> ub.com%2Fweb-platform-tests%2Fwpt%2Fsearch%3Fq%3DgetInstalledRelatedAp
> ps%26unscoped_q%3DgetInstalledRelatedApps&amp;data=02%7C01%7Csunggch%4
> 0microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91
> ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=3MVcZ48HQeocM8AH
> 7P9rQhrAzrz4xJdojbXw6MauhAg%3D&amp;reserved=0,

> is about checking Javascript API surface and it is appropriate mainly
> because testing real user scenario is app from the Windows Store,
> which can’t be done in the WebTest.
>
>  
>
> *Entry on the **feature dashboard*

>
>  
>
> *From:* Sunggook Chue
> *Sent:* Wednesday, April 1, 2020 3:45 PM
> *To:* blin...@chromium.org <mailto:blin...@chromium.org>
> *Cc:* John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>>; Peter Beverloo
> <beve...@google.com <mailto:beve...@google.com>>; Rayan Kanso
> <raya...@google.com <mailto:raya...@google.com>>
> *Subject:* Intent To Ship Review Request
>
>  
>
> Hello,
>
>  
>
> Can you review getInstalledRelatedApps’s ‘Intent To Ship’ , which is

>
>  
>
> This is Windows OS specific implementation,
>
> Doc:
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs
> .google.com%2Fdocument%2Fd%2F1oQNbuYm8aYAj1BWN6-JeWIGlgzyLvOvvFFX-7eHg
> bZU%2Fedit%3Fusp%3Dsharing&amp;data=02%7C01%7Csunggch%40microsoft.com%
> 7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%
> 7C1%7C0%7C637217635397317563&amp;sdata=10Uw%2BBETlxd%2BKzyWJQ8Zt4yb%2B
> C%2Fbvb9g9Sz4ry4wznQ%3D&amp;reserved=0

>
>  
>
> Thanks,
>
> Sunggook
>
>  
>
> --
> You received this message because you are subscribed to the Google
> Groups "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to blink-dev+...@chromium.org
> <mailto:blink-dev+...@chromium.org>.
> To view this discussion on the web visit

Sunggook Chue

unread,
Apr 7, 2020, 5:15:41 PM4/7/20
to Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo, Rayan Kanso
Hi Manuel,

1. Android ship
- It must be released, Peter/Rayan, can you confirm this?

2. If I understand this correctly, this intent is to add support for the same API on Windows. Could you please clarify this?
- Yes, this is same API for Windows implementation.

3. Also is there any significant difference between both implementations for Android vs Windows that it's worth highlighting?
- The underline validation technology (system API use) are different; Android relies on digital asset (https://developers.google.com/digital-asset-links) of Android technology meanwhile Windows relies on web-to-app link (https://docs.microsoft.com/en-us/windows/uwp/launch-resume/web-to-app-linking) of Windows technology. Android also supports webapp platform (installed PWA), but Windows not (yet).

Thanks,
Sunggook

-----Original Message-----
From: Manuel Rego Casasnovas <re...@igalia.com>
Sent: Monday, April 6, 2020 2:52 AM
To: Sunggook Chue <sun...@microsoft.com>; blin...@chromium.org
Cc: John Jansen <John....@microsoft.com>; Peter Beverloo <beve...@google.com>; Rayan Kanso <raya...@google.com>
Subject: [EXTERNAL] Re: [blink-dev] "Intent to Ship: getInstalledRelatedApps API for Windows"

I'm a bit lost regarding the status of things here.

There was an intent-to-ship for getInstalledRelatedApps for Android by the end of past year:
https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FCAAe2mZ2DrLn9fiMCwshbQiUoR0jy8c93phG_J%252B3rfYtw9%252BWmDQ%2540mail.gmail.com%3Futm_medium%3Demail%26utm_source%3Dfooter&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=lZkJPM6f%2BYfQwc2aIMYv%2FIsmqHpESCLa5J1PtqzmUYc%3D&amp;reserved=0

It was approved, but I cannot find if it's actually shipping on any release:
If I understand this correctly, this intent is to add support for the same API on Windows. Could you please clarify this?

Also is there any significant difference between both implementations for Android vs Windows that it's worth highlighting?

Thanks,
Rego

On 03/04/2020 18:49, 'Sunggook Chue' via blink-dev wrote:
> (rename the title).
>
>  
>
> *From:* Sunggook Chue
> *Sent:* Thursday, April 2, 2020 3:01 PM
> *To:* 'blin...@chromium.org' <blin...@chromium.org>
> *Cc:* John Jansen <John....@microsoft.com>; 'Peter Beverloo'
> <beve...@google.com>; 'Rayan Kanso' <raya...@google.com>
> *Subject:* RE: Intent To Ship Review Request
>
>  
>
> (copy and paste the doc below)
>
>  
>
> Title:
>
>  
>
> Intent to Ship: getInstalledRelatedApps API for Windows
>
>  
>
> Body:
>
>  
>
> *Contact emails*
>
> sun...@microsoft.com <mailto:sun...@microsoft.com>,
>
>  
>
> *Explainer*
>
> Contact: raya...@chromium.org <mailto:raya...@chromium.org>
>
> Link to explainer:
>  
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> ub.com%2FWICG%2Fget-installed-related-apps%2Fblob%2Fmaster%2FEXPLAINER
> .md&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d0
> 8d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353973
> 07563&amp;sdata=aBn%2FXVOjacbWBVzc1wcUWxhWy62uAF6gGzI1FslD%2F5U%3D&amp
> ;reserved=0
>
>  
>
> *Spec*
>
> Link to spec. 
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwicg
> .github.io%2Fget-installed-related-apps%2Fspec%2F&amp;data=02%7C01%7Cs
> unggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86
> f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=9oIDGa35
> DVeY7c4xVLsgkFWomdAntQstdjFblTNg5x4%3D&amp;reserved=0
>
>  
>
> *Summary*
>
> The doc is about Windows Desktop implementation of the
> getInstalledRelatedApps API.  The related docs and processes are
> already reviewed and signed off during Android Mobile support.
>
>  
>
> See Link to a tag review
> *Windows specific discussion*
>
>  
>
> Windows Desktop implementation:
>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> e.google.com%2Fopen%3Fid%3D1eLSHsfWCmc8IpLHye1XvP1ydvP5iMIOONUN6N15ksm
> E&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d
> 7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317
> 563&amp;sdata=D6WSyz4dcnkS2y7QtM5u5KHXEhHqNkMVnZ5XD1%2B0muY%3D&amp;res
> erved=0
>
>  
>
> Summary: It uses Windows API that returns server validated Windows
> modern apps
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fuwp%2Flaunch-resume%2Fweb-to-app-linking&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=jMbVF08fqWtKt%2F9owpBM86N8xrgR6mjaE%2FdOW4bmXvg%3D&amp;reserved=0.
> The gIRA apps filter PWA manifest’s related apps list against Windows
> API returned list.
>
>  
>
> * It returns an empty list in the Incognito mode.
> * It filters maximum 3 apps in the PWA manifest.
> * It supports only hard coded ‘store’ platform (windows store)
> * It supports only UWP, not a Win32 app.
>
>  
>
> *Is this feature supported on all six Blink platforms (Windows, Mac,
> Linux, Chrome OS, Android, and Android WebView)?*
>
>  
>
> Following this I2S, the API will be supported on Windows and Android.
>
>  
>
> It will be supported in other platforms in future.
>
>  
>
> *Demo link*
>
> If you have a demo page, link to it here.
>
>  
>
> 1. In Win10 desktop
> 2. Enable Developer Mode (Settings -> Update And Security -> For
> developers -> check developer mode)
>
> 1. If you want to real user scenario, you don’t have to do this,
> just wait a week or two so windows OS get the validation
> confirmed based on the doc
>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdoc
> s.microsoft.com%2Fen-us%2Fwindows%2Fuwp%2Flaunch-resume%2Fweb-to-app-l
> inking&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da048
> 1d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353
> 97317563&amp;sdata=jMbVF08fqWtKt%2F9owpBM86N8xrgR6mjaE%2FdOW4bmXvg%3D&
> amp;reserved=0>
> 2. Install the attached UWP app:
>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> e.google.com%2Fopen%3Fid%3D1qQbDDkz3C-9-GW-PRO4gBrYw_Z-TBau8&amp;data=
> 02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7
> C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sda
> ta=3f8uOnMkRzZKF4z0MdadT9%2FhWtp9SIi76Knz5g%2BcCB4%3D&amp;reserved=0
> 3. Start the Chromium with --enable-features=InstalledAppProvider
> 4. Visit the site
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fedge
> pwaone.azurewebsites.net%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> %7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47
> %7C1%7C0%7C637217635397317563&amp;sdata=okVqQ1wP7GSAH94DfyRUDFprbOfHij
> jZrhIsmmYtRTI%3D&amp;reserved=0 5. Click ‘getInstalledRelatedApps’ in
> the 5. ‘getInstalledRelatedApps’
> test.
>
>  
>
> Result: it will show filtered app list that is installed in the machine.
>
>  
>
> Note: if it skip 3 (installing UWP), it will show Notification
> permission dialog.
>
>  
>
> *Risks*
>
> *Interoperability and Compatibility*
>
> DEdge: Positive
>
> Firefox: Noresolved position
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgit
> hub.com%2Fmozilla%2Fstandards-positions%2Fissues%2F213&amp;data=02%7C0
> 1%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f98
> 8bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=bmh
> 1LWcMGSoaqkMjKM%2FnEr55zxWlbEsbFSWT%2FvVHtD8%3D&amp;reserved=0>
>
> Safari: No Signals
>
> Web / Framework developers: Positive based on OT feedback
>
>  
>
> *Ergonomics*
>
> No adverse effects on Chrome performance are expected.
>
>  
>
> *Activation*
>
> The API can be used immediately when shipped, but developers will need
> to update their manifest/native apps for the API to work.
>
>  
>
> *Is this feature fully tested by **web-platform-tests*
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromium.googlesource.com%2Fchromium%2Fsrc%2F%2B%2Fmaster%2Fdocs%2Ftesting%2Fweb_platform_tests.md&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=naoRWtOZG%2FSnUMh%2FJ4ZKpp9XXqrJpLyi5p5evT%2Fq4Uc%3D&amp;reserved=0>*?
> Link to test suite results from **wpt.fyi*
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwpt
> .fyi%2F&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da04
> 81d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635
> 397317563&amp;sdata=uiBlUAaSSckdqknvX2U4oxNR5OUNRlz6QHKDLMgXNqA%3D&amp
> ;reserved=0>*.*
>
>  
>
> The current tests,
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> ub.com%2Fweb-platform-tests%2Fwpt%2Fsearch%3Fq%3DgetInstalledRelatedAp
> ps%26unscoped_q%3DgetInstalledRelatedApps&amp;data=02%7C01%7Csunggch%4
> 0microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91
> ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=3MVcZ48HQeocM8AH
> 7P9rQhrAzrz4xJdojbXw6MauhAg%3D&amp;reserved=0,
> is about checking Javascript API surface and it is appropriate mainly
> because testing real user scenario is app from the Windows Store,
> which can’t be done in the WebTest.
>
>  
>
> *Entry on the **feature dashboard*
> *From:* Sunggook Chue
> *Sent:* Wednesday, April 1, 2020 3:45 PM
> *To:* blin...@chromium.org <mailto:blin...@chromium.org>
> *Cc:* John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>>; Peter Beverloo
> <beve...@google.com <mailto:beve...@google.com>>; Rayan Kanso
> <raya...@google.com <mailto:raya...@google.com>>
> *Subject:* Intent To Ship Review Request
>
>  
>
> Hello,
>
>  
>
> Can you review getInstalledRelatedApps’s ‘Intent To Ship’ , which is
> based on the https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromestatus.com%2Ffeature%2F5695378309513216&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=rMhvC2Tohe30ZQTiuiUQVU60CpPq9gvjrG%2BCsAAfpno%3D&amp;reserved=0.
>
>  
>
> This is Windows OS specific implementation,
>
> Doc:
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs
> .google.com%2Fdocument%2Fd%2F1oQNbuYm8aYAj1BWN6-JeWIGlgzyLvOvvFFX-7eHg
> bZU%2Fedit%3Fusp%3Dsharing&amp;data=02%7C01%7Csunggch%40microsoft.com%
> 7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%
> 7C1%7C0%7C637217635397317563&amp;sdata=10Uw%2BBETlxd%2BKzyWJQ8Zt4yb%2B
> C%2Fbvb9g9Sz4ry4wznQ%3D&amp;reserved=0
>
>  
>
> Thanks,
>
> Sunggook
>
>  
>
> --
> You received this message because you are subscribed to the Google
> Groups "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to blink-dev+...@chromium.org
> <mailto:blink-dev+...@chromium.org>.
> To view this discussion on the web visit

Sunggook Chue

unread,
Apr 7, 2020, 5:15:57 PM4/7/20
to Matt Giuca, blin...@chromium.org, John Jansen, Peter Beverloo, Rayan Kanso

Hi Matt,

 

‘store’ name is chosen to follow Android pattern of ‘play’.  I’m fine with other naming pattern though as store could be too much generic.

 

I prefer name of ‘windows’ on it instead of any hint of Microsoft because Windows support sideload package (enterprise has its own install pipeline) if we want to be more specific.

 

I will update this one as ‘windows’ if someone suggests otherwise.

 

Thanks,

Sunggook

Dominick Ng

unread,
Apr 7, 2020, 7:05:10 PM4/7/20
to blink-dev, mgi...@chromium.org, John....@microsoft.com, beve...@google.com, raya...@google.com, sun...@microsoft.com
+1 to "windows". Specific store implementations should be named as such - you can't look at "store" and immediately know what store it means, whereas "windows" is much more clear. Additionally, the app ID value provided is specific to each store, making the value of a generic "store" platform less obvious.

To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.

Matt Giuca

unread,
Apr 7, 2020, 9:54:49 PM4/7/20
to Dominick Ng, blink-dev, John Jansen, Peter Beverloo, Rayan Kanso, Sunggook Chue
On Wed, 8 Apr 2020 at 09:05, Dominick Ng <domi...@chromium.org> wrote:
+1 to "windows". Specific store implementations should be named as such - you can't look at "store" and immediately know what store it means, whereas "windows" is much more clear. Additionally, the app ID value provided is specific to each store, making the value of a generic "store" platform less obvious.


On Wednesday, April 8, 2020 at 7:15:57 AM UTC+10, Sunggook Chue wrote:

Hi Matt,

 

‘store’ name is chosen to follow Android pattern of ‘play’.  I’m fine with other naming pattern though as store could be too much generic.


But "play" is short for "Play Store", whereas "store" is short for "Microsoft Store". The word "Store" is common to all of these things; if you were following the Android pattern, you would choose "microsoft" (though that's slightly different since Microsoft is the name of the company, so I'd understand why you're hesitant to use that).
 

 

I prefer name of ‘windows’ on it instead of any hint of Microsoft because Windows support sideload package (enterprise has its own install pipeline) if we want to be more specific. 

 

I will update this one as ‘windows’ if someone suggests otherwise.


"windows" sounds good.
 
Rayan:

As for the platform value, I don't have any strong opinions about this. I don't think the use of store is problematic, it can be shared across OSes (like webapp is used to identify installed PWAs). The other potential values LGTM as well.

The whole point of this field is to identify the OS/store that is being used, so that fields like "id" are contextualized for a specific store. We don't want this value being shared across OSes; we want you to put "windows" to identify your Windows apps, "play" to identify your Play Store apps, etc.

"webapp" is a special case because it identifies apps in an already cross-platform ecosystem, hence why that value is shared between different OSes.

When this feature is used to identify Windows apps installed from the Microsoft Store, something more specific should be used.
 

To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.

Manuel Rego Casasnovas

unread,
Apr 8, 2020, 1:27:10 AM4/8/20
to Rayan Kanso, Sunggook Chue, blin...@chromium.org, John Jansen, Peter Beverloo

On 07/04/2020 18:24, 'Rayan Kanso' via blink-dev wrote:
> To clarify, yes the API was launched in M80, I've updated the
> chromestatus entry accordingly.

Which chromestatus entry has been updated?
The next one is not pointing to a Chromium version and it says
"proposed": https://www.chromestatus.com/feature/5695378309513216

I see the previous intent for for Android used the same entry than this
one, dunno if that's expected or if we should have 2 different entries.
I don't remember what's the usual thing to do in these cases.

Bye,
Rego

>
> As for the platform value, I don't have any strong opinions about this.
> I don't think the use of *store *is problematic, it can be shared across
> OSes (like *webapp *is used to identify installed PWAs). The other
> > *To:* 'blin...@chromium.org <mailto:blin...@chromium.org>'
> <blin...@chromium.org <mailto:blin...@chromium.org>>
> > *Cc:* John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>>; 'Peter Beverloo'
> > <beve...@google.com <mailto:beve...@google.com>>; 'Rayan Kanso'
> <raya...@google.com <mailto:raya...@google.com>>
> > *Subject:* RE: Intent To Ship Review Request
> >
> >  
> >
> > (copy and paste the doc below)
> >
> >  
> >
> > Title:
> >
> >  
> >
> > Intent to Ship: getInstalledRelatedApps API for Windows
> >
> >  
> >
> > Body:
> >
> >  
> >
> > *Contact emails*
> >
> > sun...@microsoft.com <mailto:sun...@microsoft.com>
> <mailto:sun...@microsoft.com <mailto:sun...@microsoft.com>>,
> >
> >  
> >
> > *Explainer*
> >
> > Contact: raya...@chromium.org <mailto:raya...@chromium.org>
> <mailto:raya...@chromium.org <mailto:raya...@chromium.org>>
> <http://ub.com>%2FWICG%2Fget-installed-related-apps%2Fblob%2Fmaster%2FEXPLAINER
> > .md&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d0
> > 8d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353973
> > 07563&amp;sdata=aBn%2FXVOjacbWBVzc1wcUWxhWy62uAF6gGzI1FslD%2F5U%3D&amp
> > ;reserved=0
> >
> >  
> >
> > *Spec*
> >
> > Link to spec. 
> > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwicg
> > .github.io
> <http://github.io>%2Fget-installed-related-apps%2Fspec%2F&amp;data=02%7C01%7Cs
> > unggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86
> > f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=9oIDGa35
> > DVeY7c4xVLsgkFWomdAntQstdjFblTNg5x4%3D&amp;reserved=0
> >
> >  
> >
> > *Summary*
> >
> > The doc is about Windows Desktop implementation of the
> > getInstalledRelatedApps API.  The related docs and processes are
> > already reviewed and signed off during Android Mobile support.
> >
> >  
> >
> > See Link to a tag review
> >
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fw3ctag%2Fspec-reviews%2Fissues&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=kvSCApWQwpGtaoqGY67jNhs1dmKKu%2FWeHnSPaR6YuzY%3D&amp;reserved=0>:
> > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> > ub.com
> <http://ub.com>%2Fw3ctag%2Fdesign-reviews%2Fissues%2F436&amp;data=02%7C01%7Csun
> > ggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f1
> > 41af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=5L2U%2B8J9
> > Ass4RWOA6Ces%2BOs9K3SmpyRiuvT0EbNFBHw%3D&amp;reserved=0
> >
> >  
> >
> > *Windows specific discussion*
> >
> >  
> >
> > Windows Desktop implementation:
> >
> > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> > e.google.com
> <http://e.google.com>%2Fopen%3Fid%3D1eLSHsfWCmc8IpLHye1XvP1ydvP5iMIOONUN6N15ksm
> > E&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d
> <http://s.microsoft.com>%2Fen-us%2Fwindows%2Fuwp%2Flaunch-resume%2Fweb-to-app-l
> > inking&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da048
> > 1d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353
> > 97317563&amp;sdata=jMbVF08fqWtKt%2F9owpBM86N8xrgR6mjaE%2FdOW4bmXvg%3D&
> > amp;reserved=0>
> >  2. Install the attached UWP app:
> >     
> > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> > e.google.com
> <http://e.google.com>%2Fopen%3Fid%3D1qQbDDkz3C-9-GW-PRO4gBrYw_Z-TBau8&amp;data=
> > 02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7
> > C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sda
> > ta=3f8uOnMkRzZKF4z0MdadT9%2FhWtp9SIi76Knz5g%2BcCB4%3D&amp;reserved=0
> >  3. Start the Chromium with --enable-features=InstalledAppProvider
> >  4. Visit the site
> > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fedge
> > pwaone.azurewebsites.net
> <http://pwaone.azurewebsites.net>%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>
> > %7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47
> > %7C1%7C0%7C637217635397317563&amp;sdata=okVqQ1wP7GSAH94DfyRUDFprbOfHij
> > jZrhIsmmYtRTI%3D&amp;reserved=0  5. Click
> ‘getInstalledRelatedApps’ in
> > the 5. ‘getInstalledRelatedApps’
> >     test.
> >
> >  
> >
> > Result: it will show filtered app list that is installed in the
> machine.
> >
> >  
> >
> > Note: if it skip 3 (installing UWP), it will show Notification
> > permission dialog.
> >
> >  
> >
> > *Risks*
> >
> > *Interoperability and Compatibility*
> >
> > DEdge: Positive
> >
> > Firefox: Noresolved position
> > <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgit
> > hub.com
> <http://hub.com>%2Fmozilla%2Fstandards-positions%2Fissues%2F213&amp;data=02%7C0
> > 1%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7C72f98
> > 8bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=bmh
> > 1LWcMGSoaqkMjKM%2FnEr55zxWlbEsbFSWT%2FvVHtD8%3D&amp;reserved=0>
> >
> > Safari: No Signals
> >
> > Web / Framework developers: Positive based on OT feedback
> >
> >  
> >
> > *Ergonomics*
> >
> > No adverse effects on Chrome performance are expected.
> >
> >  
> >
> > *Activation*
> >
> > The API can be used immediately when shipped, but developers will
> need
> > to update their manifest/native apps for the API to work.
> >
> >  
> >
> > *Is this feature fully tested by **web-platform-tests*
> >
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromium.googlesource.com%2Fchromium%2Fsrc%2F%2B%2Fmaster%2Fdocs%2Ftesting%2Fweb_platform_tests.md&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=naoRWtOZG%2FSnUMh%2FJ4ZKpp9XXqrJpLyi5p5evT%2Fq4Uc%3D&amp;reserved=0>*?
> > Link to test suite results from **wpt.fyi*
> > <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwpt
> > .fyi%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da04
> > 81d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635
> > 397317563&amp;sdata=uiBlUAaSSckdqknvX2U4oxNR5OUNRlz6QHKDLMgXNqA%3D&amp
> > ;reserved=0>*.*
> >
> >  
> >
> > The current tests,
> > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> > ub.com
> <http://ub.com>%2Fweb-platform-tests%2Fwpt%2Fsearch%3Fq%3DgetInstalledRelatedAp
> > ps%26unscoped_q%3DgetInstalledRelatedApps&amp;data=02%7C01%7Csunggch%4
> > 0microsoft.com
> <http://0microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91
> > ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=3MVcZ48HQeocM8AH
> > 7P9rQhrAzrz4xJdojbXw6MauhAg%3D&amp;reserved=0,
> > is about checking Javascript API surface and it is appropriate mainly
> > because testing real user scenario is app from the Windows Store,
> > which can’t be done in the WebTest.
> >
> >  
> >
> > *Entry on the **feature dashboard*
> > <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.
> > chromestatus.com
> <http://chromestatus.com>%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e
> > 1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0
> > %7C637217635397317563&amp;sdata=xMtHXaLgZmBAWbiaWWeuSdPswx95cqOEd48cGC
> > 5%2BF1s%3D&amp;reserved=0>
> >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromestatus.com%2Ffeature%2F5695378309513216&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=rMhvC2Tohe30ZQTiuiUQVU60CpPq9gvjrG%2BCsAAfpno%3D&amp;reserved=0.
> >
> >  
> >
> > *From:* Sunggook Chue
> > *Sent:* Wednesday, April 1, 2020 3:45 PM
> > *To:* blin...@chromium.org <mailto:blin...@chromium.org>
> <mailto:blin...@chromium.org <mailto:blin...@chromium.org>>
> > *Cc:* John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>
> > <mailto:John....@microsoft.com
> <mailto:John....@microsoft.com>>>; Peter Beverloo
> > <beve...@google.com <mailto:beve...@google.com>
> <mailto:beve...@google.com <mailto:beve...@google.com>>>; Rayan Kanso
> > <raya...@google.com <mailto:raya...@google.com>
> <mailto:raya...@google.com <mailto:raya...@google.com>>>
> > *Subject:* Intent To Ship Review Request
> >
> >  
> >
> > Hello,
> >
> >  
> >
> > Can you review getInstalledRelatedApps’s ‘Intent To Ship’ , which is
> > based on the
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromestatus.com%2Ffeature%2F5695378309513216&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=rMhvC2Tohe30ZQTiuiUQVU60CpPq9gvjrG%2BCsAAfpno%3D&amp;reserved=0.
> >
> >  
> >
> > This is Windows OS specific implementation,
> >
> > Doc:
> > https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs
> > .google.com
> <http://google.com>%2Fdocument%2Fd%2F1oQNbuYm8aYAj1BWN6-JeWIGlgzyLvOvvFFX-7eHg
> >
> bZU%2Fedit%3Fusp%3Dsharing&amp;data=02%7C01%7Csunggch%40microsoft.com <http://40microsoft.com>%
> > 7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%
> > 7C1%7C0%7C637217635397317563&amp;sdata=10Uw%2BBETlxd%2BKzyWJQ8Zt4yb%2B
> > C%2Fbvb9g9Sz4ry4wznQ%3D&amp;reserved=0
> >
> >  
> >
> > Thanks,
> >
> > Sunggook
> >
> >  
> >
> > --
> > You received this message because you are subscribed to the Google
> > Groups "blink-dev" group.
> > To unsubscribe from this group and stop receiving emails from it,
> send
> > an email to blink-dev+...@chromium.org
> <mailto:blink-dev%2Bunsu...@chromium.org>
> > <mailto:blink-dev+...@chromium.org
> <mailto:blink-dev%2Bunsu...@chromium.org>>.
> <http://ps.google.com>%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FDM5PR00MB02
> >
> 963F64A6DB5FEC080C90CDA2C70%2540DM5PR00MB0296.namprd00.prod.outlook.co
> <http://2540DM5PR00MB0296.namprd00.prod.outlook.co>
> > m&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d
> --
> You received this message because you are subscribed to the Google
> Groups "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to blink-dev+...@chromium.org
> <mailto:blink-dev+...@chromium.org>.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL6mntjMBm1ijgd9GmjbCCj_N_Uw4srt4SP%2BuYYMs36Az403gA%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL6mntjMBm1ijgd9GmjbCCj_N_Uw4srt4SP%2BuYYMs36Az403gA%40mail.gmail.com?utm_medium=email&utm_source=footer>.

Manuel Rego Casasnovas

unread,
Apr 8, 2020, 1:29:13 AM4/8/20
to Sunggook Chue, blin...@chromium.org, John Jansen, Peter Beverloo, Rayan Kanso

On 07/04/2020 02:17, Sunggook Chue wrote:
> 3. Also is there any significant difference between both implementations for Android vs Windows that it's worth highlighting?
> - The underline validation technology (system API use) are different; Android relies on digital asset (https://developers.google.com/digital-asset-links) of Android technology meanwhile Windows relies on web-to-app link (https://docs.microsoft.com/en-us/windows/uwp/launch-resume/web-to-app-linking) of Windows technology. Android also supports webapp platform (installed PWA), but Windows not (yet).

So for Windows it'd be only native apps, this is a concern from TAG as
it'd drive users to native apps instead of promoting the web (web apps):
https://github.com/w3ctag/design-reviews/issues/436#issuecomment-593477503

What's the plan for adding support for PWAs on Windows?

Bye,
Rego

Manuel Rego Casasnovas

unread,
Apr 8, 2020, 1:31:57 AM4/8/20
to Sunggook Chue, blin...@chromium.org, John Jansen, Peter Beverloo, Rayan Kanso

On 03/04/2020 18:49, 'Sunggook Chue' via blink-dev wrote:
> Firefox: No resolved position
> <https://github.com/mozilla/standards-positions/issues/213>

There were a few negative comments before and now Mozilla has resolved
to consider this "harmful":
https://github.com/mozilla/standards-positions/issues/213#issuecomment-610674643

Is there any plan to work on the spec to address the concerns raised there?

Thanks,
Rego

Matt Giuca

unread,
Apr 8, 2020, 1:57:16 AM4/8/20
to Manuel Rego Casasnovas, Sunggook Chue, blin...@chromium.org, John Jansen, Peter Beverloo, Rayan Kanso
On Wed, 8 Apr 2020 at 15:29, Manuel Rego Casasnovas <re...@igalia.com> wrote:

On 07/04/2020 02:17, Sunggook Chue wrote:
> 3. Also is there any significant difference between both implementations for Android vs Windows that it's worth highlighting?
> - The underline validation technology (system API use) are different; Android relies on digital asset (https://developers.google.com/digital-asset-links) of Android technology meanwhile Windows relies on web-to-app link (https://docs.microsoft.com/en-us/windows/uwp/launch-resume/web-to-app-linking) of Windows technology.  Android also supports webapp platform (installed PWA), but Windows not (yet).

So for Windows it'd be only native apps, this is a concern from TAG as
it'd drive users to native apps instead of promoting the web (web apps):
https://github.com/w3ctag/design-reviews/issues/436#issuecomment-593477503

What's the plan for adding support for PWAs on Windows?

To be clear (since both Sunggook's and Manuel's messages are very easy to misread): PWAs are fully supported on Windows.

When Sunggook says "Android also supports webapp platform (installed PWA), but Windows not (yet).", what they mean (I assume) is that on Windows you cannot yet use getInstalledRelatedApps with "platform": "webapp" to query whether an associated PWA is installed; you would only be able to (once this ships) use "platform": "windows" to query whether an associated Windows app is installed. To me, this doesn't seem like a blocker, since the main utility of getInstalledRelatedApps is querying whether your corresponding native app is installed.

To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/767b8d0b-d0d1-546a-3f7f-6943cabe9655%40igalia.com.

Manuel Rego Casasnovas

unread,
Apr 8, 2020, 5:40:17 AM4/8/20
to Matt Giuca, Sunggook Chue, blin...@chromium.org, John Jansen, Peter Beverloo, Rayan Kanso


On 08/04/2020 07:56, Matt Giuca wrote:
>
>
> On Wed, 8 Apr 2020 at 15:29, Manuel Rego Casasnovas <re...@igalia.com
> <mailto:re...@igalia.com>> wrote:
>
>
> On 07/04/2020 02:17, Sunggook Chue wrote:
> > 3. Also is there any significant difference between both
> implementations for Android vs Windows that it's worth highlighting?
> > - The underline validation technology (system API use) are
> different; Android relies on digital asset
> (https://developers.google.com/digital-asset-links) of Android
> technology meanwhile Windows relies on web-to-app link
> (https://docs.microsoft.com/en-us/windows/uwp/launch-resume/web-to-app-linking)
> of Windows technology.  Android also supports webapp platform
> (installed PWA), but Windows not (yet).
>
> So for Windows it'd be only native apps, this is a concern from TAG as
> it'd drive users to native apps instead of promoting the web (web apps):
> https://github.com/w3ctag/design-reviews/issues/436#issuecomment-593477503
>
> What's the plan for adding support for PWAs on Windows?
>
>
> To be clear (since both Sunggook's and Manuel's messages are very easy
> to misread): PWAs are fully supported on Windows.

Thanks for the clarification and sorry for the wrong wording here.
I meant adding support for PWAs in getInstalledRelatedApps for Windows,
not on Windows in general.

> When Sunggook says "Android also supports webapp platform (installed
> PWA), but Windows not (yet).", what they mean (I assume) is that on
> Windows you cannot yet use getInstalledRelatedApps with "platform":
> "webapp" to query whether an associated PWA is installed; you would only
> be able to (once this ships) use "platform": "windows" to query whether
> an associated Windows app is installed. To me, this doesn't seem like a
> blocker, since the main utility of getInstalledRelatedApps is querying
> whether your corresponding native app is installed.

This is precisely one concern raised by the TAG:
https://github.com/w3ctag/design-reviews/issues/436#issuecomment-555737785

For example on Windows pages using this API won't know if the PWA is
installed or not, so they might be prompting the user to install the
native app, when they already have a web app for this website. Or the
PWA might be ignored (bypassed), as the website would only know about
the native app.

Those are extracted from the use cases explained by Rayan at
https://github.com/mozilla/standards-positions/issues/213#issuecomment-610365453:
* Not promoting the installation of the native counterpart if the webapp
is already installed.
* Redirecting from a product page directly into the app.

Bye,
Rego

>
>
> Bye,
>   Rego
>
> >
> > Thanks,
> > Sunggook
> >
> > -----Original Message-----
> > From: Manuel Rego Casasnovas <re...@igalia.com
> <mailto:re...@igalia.com>>
> > Sent: Monday, April 6, 2020 2:52 AM
> > To: Sunggook Chue <sun...@microsoft.com
> <mailto:sun...@microsoft.com>>; blin...@chromium.org
> <mailto:blin...@chromium.org>
> > Cc: John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>>; Peter Beverloo
> <beve...@google.com <mailto:beve...@google.com>>; Rayan Kanso
> <raya...@google.com <mailto:raya...@google.com>>
> > Subject: [EXTERNAL] Re: [blink-dev] "Intent to Ship:
> getInstalledRelatedApps API for Windows"
> >
> > I'm a bit lost regarding the status of things here.
> >
> > There was an intent-to-ship for getInstalledRelatedApps for
> Android by the end of past year:
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FCAAe2mZ2DrLn9fiMCwshbQiUoR0jy8c93phG_J%252B3rfYtw9%252BWmDQ%2540mail.gmail.com%3Futm_medium%3Demail%26utm_source%3Dfooter&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=lZkJPM6f%2BYfQwc2aIMYv%2FIsmqHpESCLa5J1PtqzmUYc%3D&amp;reserved=0
> >
> > It was approved, but I cannot find if it's actually shipping on
> any release:
> > *
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.chromestatus.com%2Ffeature%2F5695378309513216&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=CKv5M5E1eC9B%2FkAlBTI3%2FqXUJBsxcuzM03LmxXsRE8g%3D&amp;reserved=0
> > *
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugs.chromium.org%2Fp%2Fchromium%2Fissues%2Fdetail%3Fid%3D895854&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=VgmA%2FyUZKqY1M2h8eqAcze5aPxl3ILJJ3qCypQCWepI%3D&amp;reserved=0
> >
> > If I understand this correctly, this intent is to add support for
> the same API on Windows. Could you please clarify this?
> >
> > Also is there any significant difference between both
> implementations for Android vs Windows that it's worth highlighting?
> >
> > Thanks,
> >   Rego
> >
> > On 03/04/2020 18:49, 'Sunggook Chue' via blink-dev wrote:
> >> (rename the title).
> >>
> >>  
> >>
> >> *From:* Sunggook Chue
> >> *Sent:* Thursday, April 2, 2020 3:01 PM
> >> *To:* 'blin...@chromium.org <mailto:blin...@chromium.org>'
> <blin...@chromium.org <mailto:blin...@chromium.org>>
> >> *Cc:* John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>>; 'Peter Beverloo'
> >> <beve...@google.com <mailto:beve...@google.com>>; 'Rayan Kanso'
> <raya...@google.com <mailto:raya...@google.com>>
> >> *Subject:* RE: Intent To Ship Review Request
> >>
> >>  
> >>
> >> (copy and paste the doc below)
> >>
> >>  
> >>
> >> Title:
> >>
> >>  
> >>
> >> Intent to Ship: getInstalledRelatedApps API for Windows
> >>
> >>  
> >>
> >> Body:
> >>
> >>  
> >>
> >> *Contact emails*
> >>
> >> sun...@microsoft.com <mailto:sun...@microsoft.com>
> <mailto:sun...@microsoft.com <mailto:sun...@microsoft.com>>,
> >>
> >>  
> >>
> >> *Explainer*
> >>
> >> Contact: raya...@chromium.org <mailto:raya...@chromium.org>
> <mailto:raya...@chromium.org <mailto:raya...@chromium.org>>
> >> ub.com
> <http://ub.com>%2FWICG%2Fget-installed-related-apps%2Fblob%2Fmaster%2FEXPLAINER
> >> .md&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d0
> >>
> 8d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353973
> >>
> 07563&amp;sdata=aBn%2FXVOjacbWBVzc1wcUWxhWy62uAF6gGzI1FslD%2F5U%3D&amp
> >> ;reserved=0
> >>
> >>  
> >>
> >> *Spec*
> >>
> >> Link to spec. 
> >>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwicg
> >> .github.io
> <http://github.io>%2Fget-installed-related-apps%2Fspec%2F&amp;data=02%7C01%7Cs
> >> unggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86
> >>
> f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=9oIDGa35
> >> DVeY7c4xVLsgkFWomdAntQstdjFblTNg5x4%3D&amp;reserved=0
> >>
> >>  
> >>
> >> *Summary*
> >>
> >> The doc is about Windows Desktop implementation of the
> >> getInstalledRelatedApps API.  The related docs and processes are
> >> already reviewed and signed off during Android Mobile support.
> >>
> >>  
> >>
> >> See Link to a tag review
> >>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fw3ctag%2Fspec-reviews%2Fissues&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=kvSCApWQwpGtaoqGY67jNhs1dmKKu%2FWeHnSPaR6YuzY%3D&amp;reserved=0>:
> >>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> >> ub.com
> <http://ub.com>%2Fw3ctag%2Fdesign-reviews%2Fissues%2F436&amp;data=02%7C01%7Csun
> >> ggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f1
> >>
> 41af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=5L2U%2B8J9
> >> Ass4RWOA6Ces%2BOs9K3SmpyRiuvT0EbNFBHw%3D&amp;reserved=0
> >>
> >>  
> >>
> >> *Windows specific discussion*
> >>
> >>  
> >>
> >> Windows Desktop implementation:
> >>
> >>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> >> e.google.com
> <http://e.google.com>%2Fopen%3Fid%3D1eLSHsfWCmc8IpLHye1XvP1ydvP5iMIOONUN6N15ksm
> >> E&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d
> >>
> >> s.microsoft.com
> <http://s.microsoft.com>%2Fen-us%2Fwindows%2Fuwp%2Flaunch-resume%2Fweb-to-app-l
> >> inking&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da048
> >>
> 1d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353
> >>
> 97317563&amp;sdata=jMbVF08fqWtKt%2F9owpBM86N8xrgR6mjaE%2FdOW4bmXvg%3D&
> >> amp;reserved=0>
> >>  2. Install the attached UWP app:
> >>     
> >>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> >> e.google.com
> <http://e.google.com>%2Fopen%3Fid%3D1qQbDDkz3C-9-GW-PRO4gBrYw_Z-TBau8&amp;data=
> >> 02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7
> >>
> C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sda
> >> ta=3f8uOnMkRzZKF4z0MdadT9%2FhWtp9SIi76Knz5g%2BcCB4%3D&amp;reserved=0
> >>  3. Start the Chromium with --enable-features=InstalledAppProvider
> >>  4. Visit the site
> >>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fedge
> %7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47
> >>
> %7C1%7C0%7C637217635397317563&amp;sdata=okVqQ1wP7GSAH94DfyRUDFprbOfHij
> >> jZrhIsmmYtRTI%3D&amp;reserved=0  5. Click
> ‘getInstalledRelatedApps’ in
> >> the 5. ‘getInstalledRelatedApps’
> >>     test.
> >>
> >>  
> >>
> >> Result: it will show filtered app list that is installed in the
> machine.
> >>
> >>  
> >>
> >> Note: if it skip 3 (installing UWP), it will show Notification
> >> permission dialog.
> >>
> >>  
> >>
> >> *Risks*
> >>
> >> *Interoperability and Compatibility*
> >>
> >> DEdge: Positive
> >>
> >> Firefox: Noresolved position
> >>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgit
> >> hub.com
> <http://hub.com>%2Fmozilla%2Fstandards-positions%2Fissues%2F213&amp;data=02%7C0
> >> 1%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7C72f98
> >>
> 8bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=bmh
> >> 1LWcMGSoaqkMjKM%2FnEr55zxWlbEsbFSWT%2FvVHtD8%3D&amp;reserved=0>
> >>
> >> Safari: No Signals
> >>
> >> Web / Framework developers: Positive based on OT feedback
> >>
> >>  
> >>
> >> *Ergonomics*
> >>
> >> No adverse effects on Chrome performance are expected.
> >>
> >>  
> >>
> >> *Activation*
> >>
> >> The API can be used immediately when shipped, but developers will
> need
> >> to update their manifest/native apps for the API to work.
> >>
> >>  
> >>
> >> *Is this feature fully tested by **web-platform-tests*
> >>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromium.googlesource.com%2Fchromium%2Fsrc%2F%2B%2Fmaster%2Fdocs%2Ftesting%2Fweb_platform_tests.md&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=naoRWtOZG%2FSnUMh%2FJ4ZKpp9XXqrJpLyi5p5evT%2Fq4Uc%3D&amp;reserved=0>*?
> >> Link to test suite results from **wpt.fyi*
> >>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwpt
> >> .fyi%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da04
> >>
> 81d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635
> >>
> 397317563&amp;sdata=uiBlUAaSSckdqknvX2U4oxNR5OUNRlz6QHKDLMgXNqA%3D&amp
> >> ;reserved=0>*.*
> >>
> >>  
> >>
> >> The current tests,
> >>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> >> ub.com
> <http://ub.com>%2Fweb-platform-tests%2Fwpt%2Fsearch%3Fq%3DgetInstalledRelatedAp
> >>
> ps%26unscoped_q%3DgetInstalledRelatedApps&amp;data=02%7C01%7Csunggch%4
> >> 0microsoft.com
> <http://0microsoft.com>%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91
> >>
> ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=3MVcZ48HQeocM8AH
> >> 7P9rQhrAzrz4xJdojbXw6MauhAg%3D&amp;reserved=0,
> >> is about checking Javascript API surface and it is appropriate
> mainly
> >> because testing real user scenario is app from the Windows Store,
> >> which can’t be done in the WebTest.
> >>
> >>  
> >>
> >> *Entry on the **feature dashboard*
> >>
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.
> >> chromestatus.com
> <http://chromestatus.com>%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e
> >>
> 1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0
> >>
> %7C637217635397317563&amp;sdata=xMtHXaLgZmBAWbiaWWeuSdPswx95cqOEd48cGC
> >> 5%2BF1s%3D&amp;reserved=0>
> >>
> >>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromestatus.com%2Ffeature%2F5695378309513216&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=rMhvC2Tohe30ZQTiuiUQVU60CpPq9gvjrG%2BCsAAfpno%3D&amp;reserved=0.
> >>
> >>  
> >>
> >> *From:* Sunggook Chue
> >> *Sent:* Wednesday, April 1, 2020 3:45 PM
> >> *To:* blin...@chromium.org <mailto:blin...@chromium.org>
> <mailto:blin...@chromium.org <mailto:blin...@chromium.org>>
> >> *Cc:* John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>
> >> <mailto:John....@microsoft.com
> <mailto:John....@microsoft.com>>>; Peter Beverloo
> >> <beve...@google.com <mailto:beve...@google.com>
> <mailto:beve...@google.com <mailto:beve...@google.com>>>; Rayan Kanso
> >> <raya...@google.com <mailto:raya...@google.com>
> <mailto:raya...@google.com <mailto:raya...@google.com>>>
> >> *Subject:* Intent To Ship Review Request
> >>
> >>  
> >>
> >> Hello,
> >>
> >>  
> >>
> >> Can you review getInstalledRelatedApps’s ‘Intent To Ship’ , which is
> >> based on the
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromestatus.com%2Ffeature%2F5695378309513216&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=rMhvC2Tohe30ZQTiuiUQVU60CpPq9gvjrG%2BCsAAfpno%3D&amp;reserved=0.
> >>
> >>  
> >>
> >> This is Windows OS specific implementation,
> >>
> >> Doc:
> >>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs
> >> .google.com
> <http://google.com>%2Fdocument%2Fd%2F1oQNbuYm8aYAj1BWN6-JeWIGlgzyLvOvvFFX-7eHg
> >>
> bZU%2Fedit%3Fusp%3Dsharing&amp;data=02%7C01%7Csunggch%40microsoft.com <http://40microsoft.com>%
> >>
> 7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%
> >>
> 7C1%7C0%7C637217635397317563&amp;sdata=10Uw%2BBETlxd%2BKzyWJQ8Zt4yb%2B
> >> C%2Fbvb9g9Sz4ry4wznQ%3D&amp;reserved=0
> >>
> >>  
> >>
> >> Thanks,
> >>
> >> Sunggook
> >>
> >>  
> >>
> >> --
> >> You received this message because you are subscribed to the Google
> >> Groups "blink-dev" group.
> >> To unsubscribe from this group and stop receiving emails from it,
> send
> >> an email to blink-dev+...@chromium.org
> <mailto:blink-dev%2Bunsu...@chromium.org>
> >> <mailto:blink-dev+...@chromium.org
> <mailto:blink-dev%2Bunsu...@chromium.org>>.
> >> To view this discussion on the web visit
> >>
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgrou
> >> ps.google.com
> <http://ps.google.com>%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FDM5PR00MB02
> >>
> 963F64A6DB5FEC080C90CDA2C70%2540DM5PR00MB0296.namprd00.prod.outlook.co
> <http://2540DM5PR00MB0296.namprd00.prod.outlook.co>
> >> m&amp;data=02%7C01%7Csunggch%40microsoft.com
> <http://40microsoft.com>%7C7411e1608aec4da0481d08d
> >>
> 7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317
> >>
> 563&amp;sdata=QWzAlw661ICXGG0EeuziNuyjnxikE%2B0BRsIZzPfjIgE%3D&amp;res
> >> erved=0
> >>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FDM5PR00MB02963F64A6DB5FEC080C90CDA2C70%2540DM5PR00MB0296.namprd00.prod.outlook.com%3Futm_medium%3Demail%26utm_source%3Dfooter&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=SDgx3nJPYnHZyA9nuk65FMOCIoQ9Tl2EwmFD53XTNDQ%3D&amp;reserved=0>.
>
> --
> You received this message because you are subscribed to the Google
> Groups "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it,
> send an email to blink-dev+...@chromium.org
> <mailto:blink-dev%2Bunsu...@chromium.org>.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/767b8d0b-d0d1-546a-3f7f-6943cabe9655%40igalia.com.
>
> --
> You received this message because you are subscribed to the Google
> Groups "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send
> an email to blink-dev+...@chromium.org
> <mailto:blink-dev+...@chromium.org>.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAHqYdcY2P3pLM%3DOhbEoTCwBR6xWa3au2ywbHG700GYSJ-P05aQ%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAHqYdcY2P3pLM%3DOhbEoTCwBR6xWa3au2ywbHG700GYSJ-P05aQ%40mail.gmail.com?utm_medium=email&utm_source=footer>.

Rayan Kanso

unread,
Apr 8, 2020, 6:18:02 AM4/8/20
to Manuel Rego Casasnovas, Matt Giuca, Sunggook Chue, blin...@chromium.org, John Jansen, Peter Beverloo
Hi Rego,
 
Which chromestatus entry has been updated?
The next one is not pointing to a Chromium version and it says
"proposed": https://www.chromestatus.com/feature/5695378309513216

I changed the Intent Stage to 'ship'. That didn't show up in the chromestatus summary so I just changed the description to better reflect the current status.

I see the previous intent for for Android used the same entry than this
one, dunno if that's expected or if we should have 2 different entries.
I don't remember what's the usual thing to do in these cases.

It's still the same API, it probably simplifies things to use the same entry. 

There were a few negative comments before and now Mozilla has resolved
to consider this "harmful":
https://github.com/mozilla/standards-positions/issues/213#issuecomment-610674643

Is there any plan to work on the spec to address the concerns raised there?

We already have a bunch of privacy safeguards in place, summarized here, which limit fingerprinting and abuse. We are also looking into further avenues.

Thanks,
~Rayan

PhistucK

unread,
Apr 8, 2020, 6:25:51 AM4/8/20
to Rayan Kanso, Manuel Rego Casasnovas, Matt Giuca, Sunggook Chue, blin...@chromium.org, John Jansen, Peter Beverloo
I am not sure why your changes were not stored. 
I updated the ChromeStatus entry with "Shipped" in Chrome for Android 80 and with Firefox opposing and a link to it standards position.
PhistucK


To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL6mntjPy39VCm996Sx8%2B1hC4nGv%2BEAMaSWXYxsanXSu07vXcg%40mail.gmail.com.

Sunggook Chue

unread,
Apr 8, 2020, 1:59:35 PM4/8/20
to Rayan Kanso, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo

Hi Rayan,

 

Does gIRA supports app from other Google play only for any Android stores? If it can supports any apps from the any store, then doesn’t ‘android’ name more make sense for Android implementation unless ‘Google play’ supports more than Android OS?  (Some developer could assume that distribution through Google play is a requirement of the API use.)

Matt Giuca

unread,
Apr 8, 2020, 10:05:16 PM4/8/20
to Sunggook Chue, Rayan Kanso, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo
On Thu, 9 Apr 2020 at 03:59, 'Sunggook Chue' via blink-dev <blin...@chromium.org> wrote:

Hi Rayan,

 

Does gIRA supports app from other Google play only for any Android stores? If it can supports any apps from the any store, then doesn’t ‘android’ name more make sense for Android implementation unless ‘Google play’ supports more than Android OS?  (Some developer could assume that distribution through Google play is a requirement of the API use.)


I don't actually know the answer to this question (maybe Rayan can answer it), but I think a more helpful way to phrase it is as follows: Is it the case that either:
a) gIRA as implemented in Chrome for Android currently only looks at Google Play store installed apps (but it could be implemented by another browser, or in Chrome, to look at apps installed from a different store or side-loaded)? or
b) gIRA as implemented in Chrome for Android looks at any installed APK, regardless of store?

(The reason I phrase it this way is that it can definitely support other stores, it's just a question of whether the current implementation does.)

If it's (a), then it makes sense to have the value called "play" because we're only considering the Play store. If hypothetically Samsung wanted to look for Galaxy-Store-installed apps, they could implement a new value "platform": "galaxy", which detects installed apps in the Galaxy Store. If it's (b), then I agree it would make more sense to call it "android" rather than "play", because the integration has nothing to do with the Play store.

Just a reminder, though, that the feature we are discussing here is the related_applications Manifest field, which is not specific to getInstalledRelatedApps. It has been specified and implemented in Chrome for about 5 years (it's used alongside the prefer_related_application field to have the browser suggest to install an Android app). So it's not trivial to change it from "play" to "android" even though gIRA itself only just launched.
 
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/DM5PR00MB02961A285C892B0634044AC4A2C30%40DM5PR00MB0296.namprd00.prod.outlook.com.

Rayan Kanso

unread,
Apr 9, 2020, 8:06:34 AM4/9/20
to Matt Giuca, Sunggook Chue, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo
The current behaviour is that gIRA on Android looks at any installed APK, regardless of store or sideloading.

~Rayan

Sunggook Chue

unread,
Apr 13, 2020, 6:50:01 PM4/13/20
to Rayan Kanso, Matt Giuca, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo

Hi,

 

I believe we have 3 issues so far,

  1. Mozilla standard discussion is hold (reject the API).
  2. Windows implementation uses ‘windows’ platform instead of ‘store’
  3. Suggestion for Android’s platform to use ‘android’ instead of ‘play’.

 

I will address 2 issue, but Rayan could address 3 if he agrees.

 

For 1, I’m not sure how we handle this though.  I’d missed the discussion so I didn’t have chance to say that the one of big consumer of this API would be Microsoft Office as they wanted to detect Win32 app existence from the JS api. (the current implementation can’t address their needs though because the web-to-app can’t support win32 apps). Our team proposed to Windows OS team for supporting this (Win32) scenario on future OS.

 

Please let me know what’s next step from my side?

 

Thanks,

Sunggook

Manuel Rego Casasnovas

unread,
Apr 14, 2020, 1:33:49 AM4/14/20
to Sunggook Chue, Rayan Kanso, Matt Giuca, blin...@chromium.org, John Jansen, Peter Beverloo

On 14/04/2020 00:27, Sunggook Chue wrote:
> I believe we have 3 issues so far,
>
> 1. Mozilla standard discussion is hold (reject the API).
> 2. Windows implementation uses ‘windows’ platform instead of ‘store’
> 3. Suggestion for Android’s platform to use ‘android’ instead of ‘play’.

I was also asking about PWAs support for this API on Windows due to the
TAG concerns on the topic:
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/767b8d0b-d0d1-546a-3f7f-6943cabe9655%40igalia.com

Do you have any plans regarding that?

Thanks,
Rego

>
>  
>
> I will address 2 issue, but Rayan could address 3 if he agrees.
>
>  
>
> For 1, I’m not sure how we handle this though.  I’d missed the
> discussion so I didn’t have chance to say that the one of big consumer
> of this API would be Microsoft Office as they wanted to detect Win32 app
> existence from the JS api. (the current implementation can’t address
> their needs though because the web-to-app can’t support win32 apps). Our
> team proposed to Windows OS team for supporting this (Win32) scenario on
> future OS.
>
>  
>
> Please let me know what’s next step from my side?
>
>  
>
> Thanks,
>
> Sunggook
>
>  
>
> *From:* Rayan Kanso <raya...@google.com>
> *Sent:* Thursday, April 9, 2020 5:06 AM
> *To:* Matt Giuca <mgi...@chromium.org>
> *Cc:* Sunggook Chue <sun...@microsoft.com>; Manuel Rego Casasnovas
> *Subject:* Re: [EXTERNAL] Re: [blink-dev] "Intent to Ship:
> the related_applications Manifest field, which is *not specific to
> getInstalledRelatedApps*. It has been specified and implemented in
> Chrome for about 5 years (it's used alongside the
> prefer_related_application field to have the browser suggest to
> install an Android app). So it's not trivial to change it from
> "play" to "android" even though gIRA itself only just launched.
>
>  
>
>  
>
> *From:* Rayan Kanso <raya...@google.com
> <mailto:raya...@google.com>>
> *Sent:* Tuesday, April 7, 2020 9:24 AM
> *To:* Sunggook Chue <sun...@microsoft.com
> <mailto:sun...@microsoft.com>>
> *Cc:* Manuel Rego Casasnovas <re...@igalia.com
> <mailto:re...@igalia.com>>; blin...@chromium.org
> <mailto:blin...@chromium.org>; John Jansen
> *Subject:* Re: [EXTERNAL] Re: [blink-dev] "Intent to Ship:
> getInstalledRelatedApps API for Windows"
>
>  
>
> Hello,
>
>  
>
> To clarify, yes the API was launched in M80, I've updated the
> chromestatus entry accordingly.
>
>  
>
> As for the platform value, I don't have any strong opinions
> about this. I don't think the use of *store *is problematic, it
> can be shared across OSes (like *webapp *is used to identify
> installed PWAs). The other potential values LGTM as well.
>
>  
>
> Thanks,
>
> ~Rayan
>
>  
>
> On Tue, Apr 7, 2020 at 1:17 AM Sunggook Chue
> <sun...@microsoft.com <mailto:sun...@microsoft.com>> wrote:
>
> Hi Manuel,
>
> 1. Android ship
> - It must be released, Peter/Rayan, can you confirm this?
>
> 2. If I understand this correctly, this intent is to add
> support for the same API on Windows. Could you please
> clarify this?
> - Yes, this is same API for Windows implementation.
>
> 3. Also is there any significant difference between both
> implementations for Android vs Windows that it's worth
> highlighting?
> - The underline validation technology (system API use) are
> different; Android relies on digital asset
> (https://developers.google.com/digital-asset-links
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdevelopers.google.com%2Fdigital-asset-links&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901398569&sdata=p92M3pUeolXXrfXShZCGV%2BTmqgNwSJYUZJFGCee7XEA%3D&reserved=0>)
> of Android technology meanwhile Windows relies on web-to-app
> link
> (https://docs.microsoft.com/en-us/windows/uwp/launch-resume/web-to-app-linking
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fuwp%2Flaunch-resume%2Fweb-to-app-linking&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901408565&sdata=kCcneui49pOEFjBpqwqhPeIroRFLr%2FpQ%2FEfLt26GoRc%3D&reserved=0>)
> of Windows technology.  Android also supports webapp
> platform (installed PWA), but Windows not (yet).
>
> Thanks,
> Sunggook
>
> -----Original Message-----
> From: Manuel Rego Casasnovas <re...@igalia.com
> <mailto:re...@igalia.com>>
> Sent: Monday, April 6, 2020 2:52 AM
> To: Sunggook Chue <sun...@microsoft.com
> <mailto:sun...@microsoft.com>>; blin...@chromium.org
> <mailto:blin...@chromium.org>
> Cc: John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>>; Peter Beverloo
> <beve...@google.com <mailto:beve...@google.com>>; Rayan
> Kanso <raya...@google.com <mailto:raya...@google.com>>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FCAAe2mZ2DrLn9fiMCwshbQiUoR0jy8c93phG_J%252B3rfYtw9%252BWmDQ%2540mail.gmail.com%3Futm_medium%3Demail%26utm_source%3Dfooter&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901418559&sdata=5N7%2BVg4Up%2FQhEgjb8BDfNKsP%2FgSBOSVRHyvV6gWTD2Y%3D&reserved=0>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.chromestatus.com%2Ffeature%2F5695378309513216&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901428552&sdata=BkTEH6ulu5VsELw5EfAAxEuH4Gff8YZ0d0p%2BgAjNjmQ%3D&reserved=0>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugs.chromium.org%2Fp%2Fchromium%2Fissues%2Fdetail%3Fid%3D895854&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901428552&sdata=kWfuHmpUhI2uLL5VZ%2BEAKOcafBKtq4TW3fDBPr3eJB0%3D&reserved=0>
>
> If I understand this correctly, this intent is to add
> support for the same API on Windows. Could you please
> clarify this?
>
> Also is there any significant difference between both
> implementations for Android vs Windows that it's worth
> highlighting?
>
> Thanks,
>   Rego
>
> On 03/04/2020 18:49, 'Sunggook Chue' via blink-dev wrote:
> > (rename the title).
> >
> >  
> >
> > *From:* Sunggook Chue
> > *Sent:* Thursday, April 2, 2020 3:01 PM
> > *To:* 'blin...@chromium.org
> <mailto:blin...@chromium.org>' <blin...@chromium.org
> <mailto:blin...@chromium.org>>
> > *Cc:* John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>>; 'Peter Beverloo'
> > <beve...@google.com <mailto:beve...@google.com>>; 'Rayan
> Kanso' <raya...@google.com <mailto:raya...@google.com>>
> > *Subject:* RE: Intent To Ship Review Request
> >
> >  
> >
> > (copy and paste the doc below)
> >
> >  
> >
> > Title:
> >
> >  
> >
> > Intent to Ship: getInstalledRelatedApps API for Windows
> >
> >  
> >
> > Body:
> >
> >  
> >
> > *Contact emails*
> >
> > sun...@microsoft.com <mailto:sun...@microsoft.com>
> <mailto:sun...@microsoft.com <mailto:sun...@microsoft.com>>,
> >
> >  
> >
> > *Explainer*
> >
> > Contact: raya...@chromium.org
> <mailto:raya...@chromium.org>
> <mailto:raya...@chromium.org <mailto:raya...@chromium.org>>
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fub.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901438548&sdata=nQEDyjTjt11XcHb%2BlYtrvsYIDMxBLhiWCmbU1k8ekJo%3D&reserved=0>%2FWICG%2Fget-installed-related-apps%2Fblob%2Fmaster%2FEXPLAINER
> > .md&amp;data=02%7C01%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901448544&sdata=ItSr%2BFT6lrMO%2FN52f3YYg3DpCrBXvn0TzcCxuxLFX4w%3D&reserved=0>%7C7411e1608aec4da0481d0
> >
> 8d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353973
> >
> 07563&amp;sdata=aBn%2FXVOjacbWBVzc1wcUWxhWy62uAF6gGzI1FslD%2F5U%3D&amp
> > ;reserved=0
> >
> >  
> >
> > *Spec*
> >
> > Link to spec. 
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwicg
> > .github.io
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fgithub.io%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901458541&sdata=hNAtC1hDVh9SGdnm9FtoYBHnCgmxW0v%2B1D3m2KfSxX8%3D&reserved=0>%2Fget-installed-related-apps%2Fspec%2F&amp;data=02%7C01%7Cs
> > unggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901458541&sdata=GZbPMs0qnPCa9x4Z3jmXIYmyKYxoNrK7go1CwJXoUEc%3D&reserved=0>%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86
> >
> f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=9oIDGa35
> > DVeY7c4xVLsgkFWomdAntQstdjFblTNg5x4%3D&amp;reserved=0
> >
> >  
> >
> > *Summary*
> >
> > The doc is about Windows Desktop implementation of the
> > getInstalledRelatedApps API.  The related docs and
> processes are
> > already reviewed and signed off during Android Mobile support.
> >
> >  
> >
> > See Link to a tag review
> >
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fw3ctag%2Fspec-reviews%2Fissues&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=kvSCApWQwpGtaoqGY67jNhs1dmKKu%2FWeHnSPaR6YuzY%3D&amp;reserved=0
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fw3ctag%2Fspec-reviews%2Fissues&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901468538&sdata=pEMaP7H7B8Bf4%2FPHKTyJ47SOUpjgOwwCd%2BBjn%2FkT4CQ%3D&reserved=0>>:
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> > ub.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fub.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901478534&sdata=Mh8szFqQY%2FnVCf5PggftEZEEeW24hoI48kjaf5ummfg%3D&reserved=0>%2Fw3ctag%2Fdesign-reviews%2Fissues%2F436&amp;data=02%7C01%7Csun
> > ggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901478534&sdata=g25ZEvpT7ypmW88SX1nNajHSx7tYktfJMPv857kcUvQ%3D&reserved=0>%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f1
> >
> 41af91ab2d7cd011db47%7C1%7C0%7C637217635397307563&amp;sdata=5L2U%2B8J9
> > Ass4RWOA6Ces%2BOs9K3SmpyRiuvT0EbNFBHw%3D&amp;reserved=0
> >
> >  
> >
> > *Windows specific discussion*
> >
> >  
> >
> > Windows Desktop implementation:
> >
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> > e.google.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fe.google.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901488526&sdata=BS1qo4skT2%2BBefjXmEx4LcksKb1KG9YkLVq3ZERWwCo%3D&reserved=0>%2Fopen%3Fid%3D1eLSHsfWCmc8IpLHye1XvP1ydvP5iMIOONUN6N15ksm
> > E&amp;data=02%7C01%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901498523&sdata=MTALfVcW2bVGZZOayQk85bjS6ZMutX2qMPx3LCf7EuY%3D&reserved=0>%7C7411e1608aec4da0481d08d
> >
> 7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317
> >
> 563&amp;sdata=D6WSyz4dcnkS2y7QtM5u5KHXEhHqNkMVnZ5XD1%2B0muY%3D&amp;res
> > erved=0
> >
> >  
> >
> > Summary: It uses Windows API that returns server validated
> Windows
> > modern apps
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fuwp%2Flaunch-resume%2Fweb-to-app-linking&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=jMbVF08fqWtKt%2F9owpBM86N8xrgR6mjaE%2FdOW4bmXvg%3D&amp;reserved=0
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fwindows%2Fuwp%2Flaunch-resume%2Fweb-to-app-linking&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901498523&sdata=SV2cxF0nCyKPWObR5cCCJwiSaiSHhBVb6hAj1M3mTTE%3D&reserved=0>.
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fs.microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901508517&sdata=mM5wb7Y93gNyk8sCn8BJ9ikCP8ijkhdvKwC10XFZs4A%3D&reserved=0>%2Fen-us%2Fwindows%2Fuwp%2Flaunch-resume%2Fweb-to-app-l
> > inking&amp;data=02%7C01%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901518514&sdata=SyyEqJafeFAKLqu6ItfmjxVe7fIybbMYkj5G06h%2FNWQ%3D&reserved=0>%7C7411e1608aec4da048
> >
> 1d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C6372176353
> >
> 97317563&amp;sdata=jMbVF08fqWtKt%2F9owpBM86N8xrgR6mjaE%2FdOW4bmXvg%3D&
> > amp;reserved=0>
> >  2. Install the attached UWP app:
> >     
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdriv
> > e.google.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fe.google.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901528513&sdata=EweLHr33Dq3xMRaT7aAjvQ8LC5jId86Hn%2BFb%2FRmwbTA%3D&reserved=0>%2Fopen%3Fid%3D1qQbDDkz3C-9-GW-PRO4gBrYw_Z-TBau8&amp;data=
> > 02%7C01%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901528513&sdata=U6kfwk9D1pPSHx73VpYrLcuhrSSKWQz6LErIsV6dGDE%3D&reserved=0>%7C7411e1608aec4da0481d08d7da102f95%7
> >
> C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sda
> >
> ta=3f8uOnMkRzZKF4z0MdadT9%2FhWtp9SIi76Knz5g%2BcCB4%3D&amp;reserved=0
> >  3. Start the Chromium with
> --enable-features=InstalledAppProvider
> >  4. Visit the site
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fedge
> > pwaone.azurewebsites.net
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fpwaone.azurewebsites.net%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901538503&sdata=rtk0zWOrcJ3l4sfkaFAB1G%2FH7oO1qBx0fxZzEwKl4OU%3D&reserved=0>%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901548501&sdata=a0IBX68bDHefZrJKVhmlK0P9%2BZXNB37gIvXLlLQjDbo%3D&reserved=0>
> >
> %7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47
> >
> %7C1%7C0%7C637217635397317563&amp;sdata=okVqQ1wP7GSAH94DfyRUDFprbOfHij
> > jZrhIsmmYtRTI%3D&amp;reserved=0  5. Click
> ‘getInstalledRelatedApps’ in
> > the 5. ‘getInstalledRelatedApps’
> >     test.
> >
> >  
> >
> > Result: it will show filtered app list that is installed
> in the machine.
> >
> >  
> >
> > Note: if it skip 3 (installing UWP), it will show
> Notification
> > permission dialog.
> >
> >  
> >
> > *Risks*
> >
> > *Interoperability and Compatibility*
> >
> > DEdge: Positive
> >
> > Firefox: Noresolved position
> >
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgit
> > hub.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fhub.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901548501&sdata=qKl2mDboGPmQn46y9kmUgXneOreAB538YFrbrsYqlME%3D&reserved=0>%2Fmozilla%2Fstandards-positions%2Fissues%2F213&amp;data=02%7C0
> > 1%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901558494&sdata=nSZr5Bk1tg6%2FEQpE%2FLd4UDQV1sd9Wmfi3QQnU62r7zo%3D&reserved=0>%7C7411e1608aec4da0481d08d7da102f95%7C72f98
> >
> 8bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=bmh
> >
> 1LWcMGSoaqkMjKM%2FnEr55zxWlbEsbFSWT%2FvVHtD8%3D&amp;reserved=0>
> >
> > Safari: No Signals
> >
> > Web / Framework developers: Positive based on OT feedback
> >
> >  
> >
> > *Ergonomics*
> >
> > No adverse effects on Chrome performance are expected.
> >
> >  
> >
> > *Activation*
> >
> > The API can be used immediately when shipped, but
> developers will need
> > to update their manifest/native apps for the API to work.
> >
> >  
> >
> > *Is this feature fully tested by **web-platform-tests*
> >
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromium.googlesource.com%2Fchromium%2Fsrc%2F%2B%2Fmaster%2Fdocs%2Ftesting%2Fweb_platform_tests.md&amp;data=02%7C01%7Csunggch%40microsoft.com%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=naoRWtOZG%2FSnUMh%2FJ4ZKpp9XXqrJpLyi5p5evT%2Fq4Uc%3D&amp;reserved=0
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromium.googlesource.com%2Fchromium%2Fsrc%2F%2B%2Fmaster%2Fdocs%2Ftesting%2Fweb_platform_tests.md&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901568489&sdata=1GjXlK9oEpzywXV2zBxWqnFjD2ciGboMdFeGsH%2Bio8w%3D&reserved=0>>*?
> > Link to test suite results from **wpt.fyi*
> >
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwpt
> > .fyi%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901578485&sdata=lyN3hrytgIHO6%2BSs54UeSN5GYTFH0bHC2uzVgO%2BBvH0%3D&reserved=0>%7C7411e1608aec4da04
> >
> 81d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637217635
> >
> 397317563&amp;sdata=uiBlUAaSSckdqknvX2U4oxNR5OUNRlz6QHKDLMgXNqA%3D&amp
> > ;reserved=0>*.*
> >
> >  
> >
> > The current tests,
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgith
> > ub.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fub.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901578485&sdata=oPv7gOWatn3cRXVWd4z8apMosWSgcpxdkIANXX8Id0w%3D&reserved=0>%2Fweb-platform-tests%2Fwpt%2Fsearch%3Fq%3DgetInstalledRelatedAp
> >
> ps%26unscoped_q%3DgetInstalledRelatedApps&amp;data=02%7C01%7Csunggch%4
> > 0microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F0microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901588484&sdata=WjqzCCsoxqZ5bzHgUOhk09oQHQeHfFf2%2FAz74mM4D24%3D&reserved=0>%7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91
> >
> ab2d7cd011db47%7C1%7C0%7C637217635397317563&amp;sdata=3MVcZ48HQeocM8AH
> > 7P9rQhrAzrz4xJdojbXw6MauhAg%3D&amp;reserved=0,
> > is about checking Javascript API surface and it is
> appropriate mainly
> > because testing real user scenario is app from the Windows
> Store,
> > which can’t be done in the WebTest.
> >
> >  
> >
> > *Entry on the **feature dashboard*
> >
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fwww.
> > chromestatus.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fchromestatus.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901598476&sdata=8xlGKbSq8qujtSpFMyUj15adPOuOW5RPSN%2FcZ6k%2FCWg%3D&reserved=0>%2F&amp;data=02%7C01%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901598476&sdata=isjYxKU9aFYuKd9GZ2doC9FLuhppyND%2Bfs%2BJZOCU7k0%3D&reserved=0>%7C7411e
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromestatus.com%2Ffeature%2F5695378309513216&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901608472&sdata=mNSKMEiIUiR1n7ec87XVJSpNbLdvHvGQmxRlMABCluE%3D&reserved=0>.
> >
> >  
> >
> > *From:* Sunggook Chue
> > *Sent:* Wednesday, April 1, 2020 3:45 PM
> > *To:* blin...@chromium.org
> <mailto:blin...@chromium.org>
> <mailto:blin...@chromium.org <mailto:blin...@chromium.org>>
> > *Cc:* John Jansen <John....@microsoft.com
> <mailto:John....@microsoft.com>
> > <mailto:John....@microsoft.com
> <mailto:John....@microsoft.com>>>; Peter Beverloo
> > <beve...@google.com <mailto:beve...@google.com>
> <mailto:beve...@google.com <mailto:beve...@google.com>>>;
> Rayan Kanso
> > <raya...@google.com <mailto:raya...@google.com>
> <mailto:raya...@google.com <mailto:raya...@google.com>>>
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromestatus.com%2Ffeature%2F5695378309513216&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901618467&sdata=3a0MtraW80YgvqUAwEhUMY7XfNa1Z9DL3F5ejMfp8AI%3D&reserved=0>.
> >
> >  
> >
> > This is Windows OS specific implementation,
> >
> > Doc:
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs
> > .google.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fgoogle.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901618467&sdata=awuggYqPGcbj7hctROMELxjCVr5CGnTVE%2FNUTiWdYYw%3D&reserved=0>%2Fdocument%2Fd%2F1oQNbuYm8aYAj1BWN6-JeWIGlgzyLvOvvFFX-7eHg
> >
> bZU%2Fedit%3Fusp%3Dsharing&amp;data=02%7C01%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901628466&sdata=p1tsn4Kxb3hZd71YTwoT78MnyvWfvUwGnUAnQhpps38%3D&reserved=0>%
> >
> 7C7411e1608aec4da0481d08d7da102f95%7C72f988bf86f141af91ab2d7cd011db47%
> >
> 7C1%7C0%7C637217635397317563&amp;sdata=10Uw%2BBETlxd%2BKzyWJQ8Zt4yb%2B
> > C%2Fbvb9g9Sz4ry4wznQ%3D&amp;reserved=0
> >
> >  
> >
> > Thanks,
> >
> > Sunggook
> >
> >  
> >
> > --
> > You received this message because you are subscribed to
> the Google
> > Groups "blink-dev" group.
> > To unsubscribe from this group and stop receiving emails
> from it, send
> > an email to blink-dev+...@chromium.org
> <mailto:blink-dev%2Bunsu...@chromium.org>
> > <mailto:blink-dev+...@chromium.org
> <mailto:blink-dev%2Bunsu...@chromium.org>>.
> > To view this discussion on the web visit
> >
> https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgrou
> > ps.google.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2Fps.google.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901638461&sdata=wC5e6bhKdbj%2FXJqH5NDHkynQeHvc0AWGo4cpzG5ToQQ%3D&reserved=0>%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FDM5PR00MB02
> >
> 963F64A6DB5FEC080C90CDA2C70%2540DM5PR00MB0296.namprd00.prod.outlook.co
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F2540dm5pr00mb0296.namprd00.prod.outlook.co%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901648458&sdata=zTVaKn8u3WBaDOnaa9XNAzNp5C0PgPeny1kIVgPKTQ8%3D&reserved=0>
> > m&amp;data=02%7C01%7Csunggch%40microsoft.com
> <https://nam06.safelinks.protection.outlook.com/?url=http%3A%2F%2F40microsoft.com%2F&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901648458&sdata=4aa8D44%2FNehxvmkyQAduiIXk0OIVtVUKyazkzZPvAxU%3D&reserved=0>%7C7411e1608aec4da0481d08d
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FDM5PR00MB02963F64A6DB5FEC080C90CDA2C70%2540DM5PR00MB0296.namprd00.prod.outlook.com%3Futm_medium%3Demail%26utm_source%3Dfooter&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901658448&sdata=e496Z8A6DLC9JdMvk8DAOXuK72fTTPNxoU3RNo3Uvzk%3D&reserved=0>>.
>
> --
> You received this message because you are subscribed to the
> Google Groups "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from
> it, send an email to blink-dev+...@chromium.org
> <mailto:blink-dev+...@chromium.org>.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/DM5PR00MB02961A285C892B0634044AC4A2C30%40DM5PR00MB0296.namprd00.prod.outlook.com
> <https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FDM5PR00MB02961A285C892B0634044AC4A2C30%2540DM5PR00MB0296.namprd00.prod.outlook.com%3Futm_medium%3Demail%26utm_source%3Dfooter&data=02%7C01%7Csunggch%40microsoft.com%7C150a1e166cc0498e603f08d7dc7e6e26%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637220307901668447&sdata=P%2FT8%2Fb3DoJnr8qpMqg8QGqOuit6HGddF6%2BIcXOSLYHY%3D&reserved=0>.
>
pEpkey.asc

Rayan Kanso

unread,
Apr 14, 2020, 9:34:23 AM4/14/20
to Manuel Rego Casasnovas, Sunggook Chue, Matt Giuca, blin...@chromium.org, John Jansen, Peter Beverloo
Hi Rego,

The TAG concern was more of an architectural one, about whether the API works with web apps. Given that the API allows room for that, I don't see starting off with only native support on Windows as a blocker for this I2S.

As for the suggestion to rename the 'play' value, I'll file a bug for that. Options include limiting to apps installed from the playstore while creating a new value for side loaded apps, or keeping it as is for now.

Thanks,
~Rayan

Mike West

unread,
Apr 23, 2020, 3:20:19 PM4/23/20
to blink-dev, raya...@google.com, mgi...@chromium.org, re...@igalia.com, John....@microsoft.com, beve...@google.com
On Tuesday, April 14, 2020 at 12:50:01 AM UTC+2, Sunggook Chue wrote:

Hi,

 

I believe we have 3 issues so far,

  1. Mozilla standard discussion is hold (reject the API).
  2. Windows implementation uses ‘windows’ platform instead of ‘store’
  3. Suggestion for Android’s platform to use ‘android’ instead of ‘play’.

 

I will address 2 issue, but Rayan could address 3 if he agrees.

 

For 1, I’m not sure how we handle this though.  I’d missed the discussion so I didn’t have chance to say that the one of big consumer of this API would be Microsoft Office as they wanted to detect Win32 app existence from the JS api. (the current implementation can’t address their needs though because the web-to-app can’t support win32 apps). Our team proposed to Windows OS team for supporting this (Win32) scenario on future OS.


Hey folks,

We talked about this briefly in the API owners' meeting. We've accepted the risk for Android, so accepting the risk for desktop doesn't seem like a stretch, but I'd like really understand where we ended up here on 2 and 3. Are the names changing? If so, to what?

-mike 

Rayan Kanso

unread,
Apr 24, 2020, 7:07:00 AM4/24/20
to Mike West, blink-dev, Matt Giuca, Manuel Rego Casasnovas, John Jansen, Peter Beverloo
Hi Mike,

The Windows implementation will use 'windows' instead of 'store' for the platform value. As for Android's platform value, that's still being discussed but it's a bit more complicated to change if we decide to go down that path since it already shipped. Regardless, it's orthogonal to this I2S which is targeting Windows.

Thanks,
~Rayan

Kenneth Rohde Christiansen

unread,
Apr 24, 2020, 7:19:21 AM4/24/20
to Sunggook Chue, Rayan Kanso, Matt Giuca, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo
> 3. Suggestion for Android’s platform to use ‘android’ instead of ‘play’.

Twitter is setting prefers_related_applications: true on desktop and
linking to the play url, which install the Twitter PWA (not Android
app) on Chrome OS - that seems to me that "play" makes more sense than
"android"

Kenneth

On Tue, Apr 14, 2020 at 12:49 AM 'Sunggook Chue' via blink-dev
> To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/MW2PR00MB029848D737169CE80E7F29E6A2DD0%40MW2PR00MB0298.namprd00.prod.outlook.com.



--
Kenneth Rohde Christiansen
Web Platform Architect, Intel Corporation.
Phone +45 4294 9458 ﹆﹆﹆

Asanka Herath

unread,
Apr 24, 2020, 11:28:59 AM4/24/20
to Kenneth Rohde Christiansen, Sunggook Chue, Rayan Kanso, Matt Giuca, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo

Hi folks,

The algorithm here suggests that instead of a single bit indicator that an associated native app is installed, the implementation would tack on the installed version. Can we remove that requirement? That way we can eliminate the product version from being a vector for joining identities across distinct user profiles.

Also can you confirm that the only native applications that a site can identify will be ones that satisfy all of the following?
* The application is a verified UWP application.
* The application is a handler for URLs in the calling document's origin as declared in its app manifest.
* The calling documents origin serves a windows-app-web-link that lists the application's package family name.

Is there a proposed limit on how many applications can be specified in related_applications ? The spec suggests that the limit is up to the UA.

Apologies if these were specified somewhere and I overlooked it.

- Asanka

Rayan Kanso

unread,
Apr 24, 2020, 12:08:19 PM4/24/20
to Asanka Herath, Kenneth Rohde Christiansen, Sunggook Chue, Matt Giuca, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo
Hi,
 
the implementation would tack on the installed version. Can we remove that requirement?
 
The version is not exposed in the Windows implementation.

Also can you confirm that the only native applications that a site can identify will be ones that satisfy all of the following?

My understanding is that the 3 conditions hold, but Sunggook can confirm for sure.

Is there a proposed limit on how many applications can be specified in related_applications

The magic number for Blink is currently 3.

Thanks,
~Rayan 
 

Sunggook Chue

unread,
Apr 24, 2020, 1:00:25 PM4/24/20
to Rayan Kanso, Asanka Herath, Kenneth Christiansen, Matt Giuca, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo

Rayan is right, Windows has also 3 apps limitation for related_applications.

 

“Also can you confirm that the only native applications that a site can identify will be ones that satisfy all of the following?"

Yes, it should meet all these conditions, but it doesn’t have to be UWP. It also support Desktop Bridge app (MSIX package).

Asanka Herath

unread,
Apr 24, 2020, 1:44:02 PM4/24/20
to Sunggook Chue, Rayan Kanso, Kenneth Christiansen, Matt Giuca, Manuel Rego Casasnovas, blin...@chromium.org, John Jansen, Peter Beverloo
On Fri, Apr 24, 2020 at 1:00 PM Sunggook Chue <sun...@microsoft.com> wrote:

Rayan is right, Windows has also 3 apps limitation for related_applications.

 

“Also can you confirm that the only native applications that a site can identify will be ones that satisfy all of the following?"

Yes, it should meet all these conditions, but it doesn’t have to be UWP. It also support Desktop Bridge app (MSIX package).

 

Thanks,

Sunggook


Sounds good. Thanks for clarifying.
- Asanka

sligh...@chromium.org

unread,
Apr 30, 2020, 3:12:45 PM4/30/20
to blink-dev, sun...@microsoft.com, raya...@google.com, kenneth.ch...@gmail.com, mgi...@chromium.org, re...@igalia.com, John....@microsoft.com, beve...@google.com
LGTM1

Mike West

unread,
Apr 30, 2020, 3:15:57 PM4/30/20
to Alex Russell, blink-dev, sun...@microsoft.com, Rayan Kanso, Kenneth Rohde Christiansen, Matt Giuca, re...@igalia.com, John....@microsoft.com, Peter Beverloo
LGTM2. Thanks for working through the naming issues such that what was `store` in the initial post is now `windows`, and we have a path towards the Android change that seems to be agreed-upon in this thread (is there a bug we should be tracking?).

-mike


--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.

Chris Harrelson

unread,
Apr 30, 2020, 4:06:03 PM4/30/20
to Mike West, Alex Russell, blink-dev, sun...@microsoft.com, Rayan Kanso, Kenneth Rohde Christiansen, Matt Giuca, Manuel Rego Casasnovas, John....@microsoft.com, Peter Beverloo

Rayan Kanso

unread,
May 1, 2020, 7:59:43 AM5/1/20
to Chris Harrelson, Mike West, Alex Russell, blink-dev, Sunggook Chue, Kenneth Rohde Christiansen, Matt Giuca, Manuel Rego Casasnovas, John Jansen, Peter Beverloo
Here's the bug for tracking the Android change.
Reply all
Reply to author
Forward
0 new messages