Does this intent deprecate or change behavior of existing APIs, such that it has potentially high risk for Android WebView-based applications?
No information provided| Shipping on desktop | 144 |
| Shipping on Android | 144 |
| Shipping on WebView | 144 |
Contact emailsnrose...@chromium.org
Specificationhttps://html.spec.whatwg.org/multipage/nav-history-apis.html#shared-history-push/replace-state-steps
SummaryCalling pushState/replaceState more than 200 of times/second would throw an exception instead of failing silently. This aligns with existing Gecko & WebKit behavior.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/691ecb91.050a0220.ba486.0017.GAE%40google.com.
On 11/20/25 3:04 a.m., Chromestatus wrote:
Is there a plan to specify this (interoperable) behavior? After step 10, HTML talks about implementation-defined limits, but not about throwingContact emailsnrose...@chromium.org
Specificationhttps://html.spec.whatwg.org/multipage/nav-history-apis.html#shared-history-push/replace-state-steps
SummaryCalling pushState/replaceState more than 200 of times/second would throw an exception instead of failing silently. This aligns with existing Gecko & WebKit behavior.
Great, thanks for the pointer. Looking at the many comments at https://github.com/livewire/livewire/discussions/7746, this doesn't seem like a safe change - even if this framework fixes their code, who knows how many sites will never get upgraded, and will be broken in Chrome as well as Firefox and Safari.
It seems like the more compatible path forward would be for Firefox and WebKit to align with Chromium (and the current spec, given that throwing is Optional...), or perhaps there's a middle ground to increase the limit from 200 to 500 or 1000 or something that covers 80% of scenarios like this (even if they seem like weird edge cases).
Given that this is definitely going to break sites, this should be an Intent to Ship instead of a PSA (sorry to be _that_ API Owner) and we should dig in a bit more to learn what is the blast radius. if possible, getting some UseCounter and/or histogram data would be helpful.
thanks,
Mike