URLs with non-special schemes will be supported in chrome. `non-speicial://test.com:1234/path` will be become a valid URL. One can access and set the URL properties such as host, port and path via the URL class.
No significant risks.
No significant risks.
data:// and javascript:// URLs handling is not modified due to their critical role.
Does this intent deprecate or change behavior of existing APIs, such that it has potentially high risk for Android WebView-based applications?
No milestones specified
Open questions about a feature may be a source of future web compat or interop issues. Please list open issues (e.g. links to known github issues in the project for the feature specification) whose resolution may introduce web compat/interop risk (e.g., changing to naming or structure of the API in a non-backward-compatible way).
Do URLs with an intent:// scheme have any security
considerations, or implications for WebView? (I don't know,
hopefully someone who does can answer. :))
Debuggability
Will this feature be supported on all six Blink platforms (Windows, Mac, Linux, Chrome OS, Android, and Android WebView)?
Yes
Is this feature fully tested by web-platform-tests?
Yes
Flag name
NonSpeicalSchemeURLParsing
Requires code in //chrome?
False
Tracking bug
https://crbug.com/1416006
Sample links
https://chromium-review.googlesource.com/c/chromium/src/+/4273893
Estimated milestones
No milestones specified
Anticipated spec changes
Open questions about a feature may be a source of future web compat or interop issues. Please list open issues (e.g. links to known github issues in the project for the feature specification) whose resolution may introduce web compat/interop risk (e.g., changing to naming or structure of the API in a non-backward-compatible way).
Link to entry on the Chrome Platform Status
https://chromestatus.com/feature/5201116810182656
This intent message was generated by Chrome Platform Status.
--
You received this message because you are subscribed to the Google Groups "blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to blink-dev+...@chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAJQw1Nzk847XL759vMSQaF3L5zvtykg6UfQvuss4diyU-h1%3Duw%40mail.gmail.com.
On 2/22/23 8:21 AM, 'Jiacheng Guo' via blink-dev wrote:
Specification
https://url.spec.whatwg.org/#url-parsing
Summary
URLs with non-special schemes will be supported in chrome. `non-speicial://test.com:1234/path` will be become a valid URL. One can access and set the URL properties such as host, port and path via the URL class.
Blink component
Blink>JavaScript>API
TAG review
TAG review status
Not applicable
Risks
Interoperability and Compatibility
Gecko: Positive
WebKit: Positive
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/7cdf2693-c8a3-d263-0eb0-a44a2390979e%40chromium.org.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfVfGhV%2BDRzpCjGFoHg7EXb325nHz3nu4OSQVTTC6bkS1A%40mail.gmail.com.
Hi Jiacheng,
Friendly ping on Harald's and my questions. :)
thanks,
Mike
Thanks for the doc - if "WPT URL failure triage" is what you
intended to send, could you point out which section contains the
security concerns? (Or maybe just linked the wrong doc on
accident?)
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAJQw1NwdWUn7OOrEgGjGeZV%3DHa_niTT0Jg_yv7j7uN2uRL7fcA%40mail.gmail.com.
I added the security team to ask for their comments as well.
You received this message because you are subscribed to the Google Groups "Chrome Security Architecture Core team" group.
To unsubscribe from this group and stop receiving emails from it, send an email to chrome-security-archit...@google.com.
To view this discussion on the web visit https://groups.google.com/a/google.com/d/msgid/chrome-security-architecture-core/CAM0wra_zfah%3DBsGL_GXW_RY7CtFvY646yoKvRiFGosTTL9FxjQ%40mail.gmail.com.
For more options, visit https://groups.google.com/a/google.com/d/optout.
To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOzWxF6wJ17ChhQbaDGz4O8X-zjo0dx7tS-_zuXzeOUKO%2BynPQ%40mail.gmail.com.
As to the Android WebView hack, currently "foo://test" on Android Webview has a valid security origin with an empty host (foo://).By the standard the origin will be "foo://test". After the patch the behavior will be affected.
The hack traces back to crbug.com/896059 and b/117514441. For some reason, Gmail depends on this behavior to work.Chances are that we need to keep that hack.