Contact emails
ikilp...@chromium.org, xida...@chromium.org, fla...@chromium.org
Spec
https://drafts.css-houdini.org/css-paint-api/
TAG review: https://github.com/w3ctag/design-reviews/issues/140Summary
The CSS Paint API defines a new way for developers to draw content into a CSS <image> during the paint phase of the rendering engine.
Link to “Intent to Implement” blink-dev discussion
https://groups.google.com/a/chromium.org/forum/#!topic/blink-dev/A4PZz_mXOTg
Is this feature supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
Yes.
Demo link
https://github.com/GoogleChrome/houdini-samples/tree/master/paint-worklet
Interoperability and Compatibility Risk
Compatibility Risk: None, adding a new primitive to the web platform.
Interoperability Risk: None. By informing the specification we hope that this will allow us to ship a version of this API which is interoperable with other browsers. Our implementation might inform a change in the specification, which might result in a change in our implementation.
Edge: No public signal
Firefox: In development
Safari: No public signal
Web developers: Positive
Reference: https://ishoudinireadyyet.com/
Is this feature fully tested by web-platform-tests?
Yes.
https://github.com/w3c/web-platform-tests/tree/master/css-paint-api
OWP launch tracking bug
Entry on the feature dashboard
https://www.chromestatus.com/feature/5685444318593024--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALRxhAue66tgCPaG%3DKXF3QB54xHJ1%3Didho3b4TZbaa34K%2B0%3DoQ%40mail.gmail.com.
The interoperability risk is pretty high - Blink is the first to ship this and Edge as well as Safari have no signals, which may mean they will never ship this.The fact that Firefox is developing this (do you have a reference for this?) is encouraging,
but it does not mean it is not risky.
Does the Blink interoperate with Gecko using their apparently in-development implementation?
It is a bit funny to have all of the browsers except Chrome (without any flag, I reckon) pass this test without even implementing the paint API themselves -Perhaps the test is wrong?Same for a few others -
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
Thanks for the feedback.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/9f22b438-8724-32d3-5816-51d65661e407%40crisal.io.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOtFfx4bb%3DGjFQxgGhBPn0ze_xX2Xfb6z6L0KwKFiBSbqEOXcQ%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/c580d3a3-d9d2-1882-b974-33ac706c0837%40mit.edu.
I'm excited to see this ship. The design being discussed in great detail with the other major vendors in the Houdini group definitely reduces the interop risk. There's still risk to going first with a powerful new primitive of course, but I think it's a risk worth taking in this case.Will this be the first shipping use of worklets? Or is shipping worklets covered by a separate intent?
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAJL3UpR68bc8E8zqETudryw-gDo4i2S1Y0MycUOsyNnU%3D4mnEQ%40mail.gmail.com.
One thing that was pointed out specifically on:...which annevk mentioned was the concerns around secure contexts.The minutes from the last time the HoudiniTF discussed this is here:This is a difficult decision for this API. On the one hand its a new capability, which we typically try to ship for secure contexts only to aid in secure context adoption.On the other hand the discussion with the HoudiniTF brings up some issues, specifically:- No ability to detect having a secure context within CSS. E.g. a CSS framework using this feature can't detect if its within a secure context.
- This subsets the rendering engine with feature policy - which we haven't done before, e.g. css grid wasn't shipped only to secure contexts.
The discussion with the HoudiniTF (and TAG members who were in the room) didn't come to a concrete conclusion.We can add [SecureContext] to the Worklet interface and CSS.paintWorklet attribute initially, and then relax, but would like to hear additional thoughts.However the above would be strange as there would be a difference between:.no-paint-api {background: /* fallback */;background: paint(foo);}.paint-api-on-non-secure-context {background: /* fallback */;background: paint(foo); /* valid - but nothing displayed */}
--.paint-api-on-secure-context {background: /* fallback */;background: paint(foo); /* valid - paint api displayed */}(The above is typically how a developer performs CSS fallback.)
On Thursday, September 14, 2017, Boris Zbarsky <bzba...@mit.edu> wrote:On 9/11/17 9:58 AM, Emilio Cobos Álvarez wrote:
Yeah, I guess the "Intent to experiment"[1] does count as a positive
signal though :)...
[1]:
https://groups.google.com/forum/#!topic/mozilla.dev.platform/uI5bHZil2KU
I should note that the "Risks" section of that is very real, and I have seen no evidence that the risks have been addressed.
As far as I can tell, the current state of this in Gecko is:
1) We're evaluating whether the idea makes sense at all, but the evaluation has stalled because it got deprioritized relative to other things.
2) We're not clear on whether it's a _good_ idea even if it does make sense as something one could do.
That's just on the basic concept. I haven't been following the spec situation enough to tell you whether there are problems on that end.
-Boris
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/c580d3a3-d9d2-1882-b974-33ac706c0837%40mit.edu.
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAJL3UpR68bc8E8zqETudryw-gDo4i2S1Y0MycUOsyNnU%3D4mnEQ%40mail.gmail.com.
Thanks for calling this out, Ian!On Tue, Sep 19, 2017 at 9:56 AM, Ian Kilpatrick <ikilp...@chromium.org> wrote:One thing that was pointed out specifically on:...which annevk mentioned was the concerns around secure contexts.The minutes from the last time the HoudiniTF discussed this is here:This is a difficult decision for this API. On the one hand its a new capability, which we typically try to ship for secure contexts only to aid in secure context adoption.On the other hand the discussion with the HoudiniTF brings up some issues, specifically:- No ability to detect having a secure context within CSS. E.g. a CSS framework using this feature can't detect if its within a secure context.This seems like an argument for feature detection inside CSS rather than rejection of a constraint that would require feature detection. It seems that you'll need feature detection one way or the other, since the behavior specified by the `paint(...)` CSS value depends on support from the JavaScript side, right?- This subsets the rendering engine with feature policy - which we haven't done before, e.g. css grid wasn't shipped only to secure contexts.I'd suggest that we need to start somewhere. The fact that this feature bridges across CSS (where we apparently don't have good feature-detection mechanisms) and JavaScript (where we do) makes it a pretty reasonable starting point, in my opinion.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAKXHy%3DcimBE%2BC0d8-L2FC3y05XJC1uo6RfyFLR2g3t54gxpZ2w%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/c580d3a3-d9d2-1882-b974-33ac706c0837%40mit.edu.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAABs73hn9Emnw1bbkgmSMPNZrtBcY18z_WSZ3bDvLVHtdfk-rw%40mail.gmail.com.
On Tue, Sep 19, 2017 at 5:53 PM, Mike West <mk...@chromium.org> wrote:Thanks for calling this out, Ian!On Tue, Sep 19, 2017 at 9:56 AM, Ian Kilpatrick <ikilp...@chromium.org> wrote:One thing that was pointed out specifically on:...which annevk mentioned was the concerns around secure contexts.The minutes from the last time the HoudiniTF discussed this is here:This is a difficult decision for this API. On the one hand its a new capability, which we typically try to ship for secure contexts only to aid in secure context adoption.On the other hand the discussion with the HoudiniTF brings up some issues, specifically:- No ability to detect having a secure context within CSS. E.g. a CSS framework using this feature can't detect if its within a secure context.This seems like an argument for feature detection inside CSS rather than rejection of a constraint that would require feature detection. It seems that you'll need feature detection one way or the other, since the behavior specified by the `paint(...)` CSS value depends on support from the JavaScript side, right?- This subsets the rendering engine with feature policy - which we haven't done before, e.g. css grid wasn't shipped only to secure contexts.I'd suggest that we need to start somewhere. The fact that this feature bridges across CSS (where we apparently don't have good feature-detection mechanisms) and JavaScript (where we do) makes it a pretty reasonable starting point, in my opinion.(CSS non-expert question, sorry)Can CSS @supports be used to detect this?@supports (background: paint(foo)) { /* ... */ }The discussion with the HoudiniTF (and TAG members who were in the room) didn't come to a concrete conclusion.We can add [SecureContext] to the Worklet interface and CSS.paintWorklet attribute initially, and then relax, but would like to hear additional thoughts.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CACuR13eLrmYas2hpTtu%3D4vSKSFGdHw7m14uBtUtY9H%3D%3D2bEjJg%40mail.gmail.com.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY8cv6kZeX2%2BTt1ei7q-RUQWHKkZvjL-9BqsYDKmh%2BBiUg%40mail.gmail.com.
On Thu, Sep 14, 2017 at 2:21 PM, Anne van Kesteren <ann...@annevk.nl> wrote:
> On Tue, Sep 12, 2017 at 7:15 PM, Xida Chen <xida...@chromium.org> wrote:
>> I believe the interop risk is moderate given that: Firefox and other
>> browsers have made significant inputs to the specification and currently
>> there is no disagreement on it, so we believe that will reduce the interop
>> risk when they do implement this feature.
>
> FWIW, it does seem there's still quite a few issues with worklets that
> have gone unaddressed for quite a while (not necessarily exhaustive):
>
> https://github.com/whatwg/fetch/pull/527#pullrequestreview-60270088
> https://github.com/w3c/css-houdini-drafts/pull/379#discussion_r134282891
> https://github.com/w3c/css-houdini-drafts/issues/224
> https://github.com/w3c/css-houdini-drafts/issues/237
> https://github.com/w3c/css-houdini-drafts/issues/380
>
> So there's definitely room for disagreement pending on how the above
> are handled.
I'm somewhat surprised I didn't get a reply thus far and everything
seems to be going ahead. Isn't figuring out which service worker to
use for worklet fetches considered important for interoperability?
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADnb78iLhDh02CHp%3DgYDuLi3Tw8A%3DCTbxLeCzFD3z5OruhW6%2Bg%40mail.gmail.com.
Responses inline.On Sun, Sep 24, 2017 at 8:21 PM, Anne van Kesteren <ann...@annevk.nl> wrote:On Thu, Sep 14, 2017 at 2:21 PM, Anne van Kesteren <ann...@annevk.nl> wrote:
> On Tue, Sep 12, 2017 at 7:15 PM, Xida Chen <xida...@chromium.org> wrote:
>> I believe the interop risk is moderate given that: Firefox and other
>> browsers have made significant inputs to the specification and currently
>> there is no disagreement on it, so we believe that will reduce the interop
>> risk when they do implement this feature.
>
> FWIW, it does seem there's still quite a few issues with worklets that
> have gone unaddressed for quite a while (not necessarily exhaustive):
>
> https://github.com/whatwg/fetch/pull/527#pullrequestreview-60270088That was an oversight on my behalf. I thought that this required additional feedback from @jakearchibald @jungkees.I've updated the pull request such that worklets will reuse the document's serviceworker.
> https://github.com/w3c/css-houdini-drafts/pull/379#discussion_r134282891Being discussed for Blink in https://groups.google.com/a/chromium.org/forum/#!msg/blink-api-owners-discuss/Gmxej1Ryj8c/djiqh8kMAAAJ
> https://github.com/w3c/css-houdini-drafts/issues/224I accidentally left this open I think, there is now a concept of an owner document for each worklet global scope, the global scope is destroyed when the document goes away.+nhiroki, is there a WPT that we can add for this?
> https://github.com/w3c/css-houdini-drafts/issues/237This was discussed at the last F2F, and I believe there is just editorial changes that need to be made to the spec.+tab will be able to shed more light.> https://github.com/w3c/css-houdini-drafts/issues/380This won't have any risk for paint worklet as I understand it, as paint worklet doesn't have any way to invoke the structured clone machinery.
>
> So there's definitely room for disagreement pending on how the above
> are handled.
I'm somewhat surprised I didn't get a reply thus far and everything
seems to be going ahead. Isn't figuring out which service worker to
use for worklet fetches considered important for interoperability?
--
https://annevankesteren.nl/
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADnb78iLhDh02CHp%3DgYDuLi3Tw8A%3DCTbxLeCzFD3z5OruhW6%2Bg%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAJL3UpRmozW%3DTpDLiHtSP0v9Pyd04aE4uSzjr20%3D5xVnWf_jYg%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADnb78isA%3DTjqBpY_%3DohZtpLmqD3Mp8bMA5i647RwPD3RyLbJg%40mail.gmail.com.
Xida, Ian, this is starting to be a long thread, can you summarize what the outstanding issues are, and what they are blocked on?
Given the complexity of implementation, I think it is even more important than usual to get a good idea about the intentions of other browser vendors. Have you just been unable to get public signals for Edge and Safari, or are there no signals at all? We could escalate to make sure that this hasn't gone under the radar for them, if that's at all plausible.
The amount of tests in http://wpt.fyi/css-paint-api is great and should be a help for a second implementer. Is there an issue tracking making those tests all fail when the API isn't implemented?
I left a comment on https://github.com/w3c/css-houdini-drafts/pull/472 about testing the non-deterministic bits.
+nhiroki Is there anything blocking us from upstreaming our worklet tests to WPT now? (We have crbug.com/724907 tracking this).
> https://github.com/w3c/css-houdini-drafts/issues/224I accidentally left this open I think, there is now a concept of an owner document for each worklet global scope, the global scope is destroyed when the document goes away.+nhiroki, is there a WPT that we can add for this?
Responses inline.On Mon, Sep 25, 2017 at 9:46 PM, Philip Jägenstedt <foo...@google.com> wrote:Xida, Ian, this is starting to be a long thread, can you summarize what the outstanding issues are, and what they are blocked on?The [SecureContext] discussion is something that we need consensus on, at least within Blink.Blocked-on: For this I'd be good for the blink-api-owners to continue drive the discussion such that we can reach an consensus for the paint api.
Given the complexity of implementation, I think it is even more important than usual to get a good idea about the intentions of other browser vendors. Have you just been unable to get public signals for Edge and Safari, or are there no signals at all? We could escalate to make sure that this hasn't gone under the radar for them, if that's at all plausible.Unable to get public signals for Edge and Safari, neither implementor has committed to implementing and shipping these APIs, however we've tried to address any concerns that have been raised by them in meetings.I don't believe that this has gone under the radar for them, last F2F meeting we said that we were planning to ship soon.
On Tue, Sep 26, 2017 at 5:01 AM Ian Kilpatrick <ikilp...@chromium.org> wrote:Responses inline.On Mon, Sep 25, 2017 at 9:46 PM, Philip Jägenstedt <foo...@google.com> wrote:Xida, Ian, this is starting to be a long thread, can you summarize what the outstanding issues are, and what they are blocked on?The [SecureContext] discussion is something that we need consensus on, at least within Blink.Blocked-on: For this I'd be good for the blink-api-owners to continue drive the discussion such that we can reach an consensus for the paint api.Ian, is there any concrete proposal for secure context feature detection in CSS that we could tie this to? Something like @secure { ... }?For me, I think it'd be fine to have as a general rule that new CSS features will exist in all contexts, because it's easier to make it so, and because it doesn't change what pixels can end up in front of a user, only the ease of doing it.Jochen, Mike, what information do you think we need to make a decision on this? Does the use of worklets change the picture?
Given the complexity of implementation, I think it is even more important than usual to get a good idea about the intentions of other browser vendors. Have you just been unable to get public signals for Edge and Safari, or are there no signals at all? We could escalate to make sure that this hasn't gone under the radar for them, if that's at all plausible.Unable to get public signals for Edge and Safari, neither implementor has committed to implementing and shipping these APIs, however we've tried to address any concerns that have been raised by them in meetings.I don't believe that this has gone under the radar for them, last F2F meeting we said that we were planning to ship soon.Thanks, that will have to do, if they thought it was a terrible idea we would hopefully have heard.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAARdPYfiD5mP%2B6Ta7Vbs6NmLWTGZUhstm92r8tPufMD7pDRCCw%40mail.gmail.com.
On Wed, Sep 27, 2017 at 2:50 PM 'Philip Jägenstedt' via blink-dev <blin...@chromium.org> wrote:On Tue, Sep 26, 2017 at 5:01 AM Ian Kilpatrick <ikilp...@chromium.org> wrote:Responses inline.On Mon, Sep 25, 2017 at 9:46 PM, Philip Jägenstedt <foo...@google.com> wrote:Xida, Ian, this is starting to be a long thread, can you summarize what the outstanding issues are, and what they are blocked on?The [SecureContext] discussion is something that we need consensus on, at least within Blink.Blocked-on: For this I'd be good for the blink-api-owners to continue drive the discussion such that we can reach an consensus for the paint api.Ian, is there any concrete proposal for secure context feature detection in CSS that we could tie this to? Something like @secure { ... }?For me, I think it'd be fine to have as a general rule that new CSS features will exist in all contexts, because it's easier to make it so, and because it doesn't change what pixels can end up in front of a user, only the ease of doing it.Jochen, Mike, what information do you think we need to make a decision on this? Does the use of worklets change the picture?In the end, we'll need some way to feature-detect the presence of the paint API in CSS - otherwise, sites would have to fallback to UA sniffing, no?
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAARdPYdP4TXpG4ZP3OniRFbm8rwcEFxie_pdTYVqNagB5eW51w%40mail.gmail.com.
We do you think a new at-rule (@secure {}) is needed? Why is @supports not enough?@supports (background: paint(foo)) {}
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAARdPYfsoHjYRCeHHF0A5ZiQGQdtyg3Lhmv3Bta7j7%3D8qGkacQ%40mail.gmail.com.
I think we could support this and standard CSS fallback by checking whether we're in a secure context before parsing the paint property here:However, this would be the first CSS property value to parse only in secure contexts. I'm guessing this would be fine, since quirks mode also affects parsing but it's worthy of consideration.
On Wed, Sep 27, 2017 at 12:43 PM, 'Philip Jägenstedt' via blink-dev <blin...@chromium.org> wrote:--On Wed, Sep 27, 2017 at 6:39 PM PhistucK <phis...@gmail.com> wrote:We do you think a new at-rule (@secure {}) is needed? Why is @supports not enough?@supports (background: paint(foo)) {}Huh, that makes sense :) Ian, Xida, could it be that simple?
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAARdPYfsoHjYRCeHHF0A5ZiQGQdtyg3Lhmv3Bta7j7%3D8qGkacQ%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAJh39TPZR8fAuxuAwAuWbb%3DE%3D3H-o4Kd%2Bcayb9XCtMcsCDz4aQ%40mail.gmail.com.
So, I think that the deciding factor here is whether we should attempt to limit all worklets to secure contexts. Then this CSS property value would be limited to secure contexts as a side effect, not because we're going to limit all future CSS properties/values to secure contexts. Jochen, WDYT?
On Wed, Sep 27, 2017 at 10:28 AM, Philip Jägenstedt <foo...@google.com> wrote:So, I think that the deciding factor here is whether we should attempt to limit all worklets to secure contexts. Then this CSS property value would be limited to secure contexts as a side effect, not because we're going to limit all future CSS properties/values to secure contexts. Jochen, WDYT?So its little difficult phrasing it this way - as its not how developers would think about this feature. (Part of why this is so hard is that worklets by themselves don't add any usable web api, only apis which use them do). Without worklets in the API it becomes similar to limiting grid, or conic-gradient to secure contexts.
As a mental experiment, would we make the CSS Paint API secure context only - if it used the standard worker infrastructure instead?
--
https://annevankesteren.nl/
--
https://annevankesteren.nl/
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADnb78geuRc9XPS4uECS8RkAKwaLxz-WNssQPssT8YKHiuh20A%40mail.gmail.com.
The API owners met today to discuss this intent, and also the issue of requiring secure contexts. We decided the following:1. Ship CSS Paint in secure contexts only, and also block future types of worklets (e.g. audio worklet) on secure contexts.2. Don't change policy regarding secure contexts for other features at this time.Other than that, I think this intent LGTM1. There are a couple of last-minute details I've brought up on other threads, but will work on them in parallel with this.On Fri, Sep 29, 2017 at 2:06 AM, Anne van Kesteren <ann...@annevk.nl> wrote:On Thu, Sep 28, 2017 at 8:33 PM, 'Ian Kilpatrick' via blink-dev
<blin...@chromium.org> wrote:
> Right if its a lot - then you're right, this is much less of a concern. I
> don't see the wider browser community there yet however. E.g. we shipped ES6
> modules without this discussion, should the upcoming javascript module
> import() be shipped in secure contexts only?
I'd like that. We really need to get to the point where you need to
have strong justification to not do it.
> (I still think that there are other valid reasons discussed in api owners
> thread).
I think if we commit to doing it quite a few of those reasons will end
up disappearing due to ripple effects. And if we really turn out to be
wrong somehow it's easy enough to remove the restriction. Adding the
restriction after-the-fact is much harder.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
LGTM3.
LGTM2
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+unsubscribe@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADnb78geuRc9XPS4uECS8RkAKwaLxz-WNssQPssT8YKHiuh20A%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOtFfx79JmvOjtDeC8_dKuxqu%2B0D6%2B2gSFPes313_XSdcbf6Jg%40mail.gmail.com.
LGTM3.
LGTM2
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADnb78geuRc9XPS4uECS8RkAKwaLxz-WNssQPssT8YKHiuh20A%40mail.gmail.com.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.