Skip to content

Commit 2eea8cc

Browse files
authored
Update default permission policy (#713)
* Update default permission policy * Link to the permissions policy spec
1 parent 93eb19e commit 2eea8cc

2 files changed

Lines changed: 6 additions & 33 deletions

File tree

EVENT.md

Lines changed: 4 additions & 30 deletions
Original file line numberDiff line numberDiff line change
@@ -224,36 +224,10 @@ reporting origin.
224224
225225
### Publisher-side Controls for Attribution Source Declaration
226226
227-
In order to prevent arbitrary third parties from registering sources without the
228-
publisher’s knowledge, the Attribution Reporting API will need to be enabled in
229-
child contexts by a new [Permissions
230-
Policy](https://w3c.github.io/webappsec-permissions-policy/):
231-
232-
```html
233-
<iframe src="https://advertiser.example" allow="attribution-reporting 'src'">
234-
235-
<a … attributionsrc="https://ad-tech.example?..."></a>
236-
237-
</iframe>
238-
```
239-
240-
The API will be enabled by default in the top-level context and in same-origin
241-
children. Any script running in these contexts can declare a source with any
242-
reporting origin. Publishers who wish to explicitly disable the API for all
243-
parties can do so via an [HTTP
244-
header](https://w3c.github.io/webappsec-permissions-policy/#permissions-policy-http-header-field).
245-
246-
Without a Permissions Policy, a top-level document and cooperating iframe could
247-
recreate this functionality. This is possible by using
248-
[postMessage](https://html.spec.whatwg.org/multipage/web-messaging.html#dom-window-postmessage)
249-
to send the `source_event_id`, `attributionsrc` origin, `destination` values to
250-
the top level document who can then wrap the iframe in an anchor tag (with some
251-
additional complexities behind handling clicks on the iframe). Using Permissions
252-
Policy prevents the need for these hacks. This is inline with the classification
253-
of powerful features as discussed on [this
254-
issue](https://github.com/w3c/webappsec-permissions-policy/issues/252).
255-
256-
**NOTE**: For the [Chromium Origin Trial](https://developer.chrome.com/blog/privacy-sandbox-unified-origin-trial/), the Chromium implementation of the Attribution Reporting API will temporarily ship with a Permissions Policy [default](https://w3c.github.io/webappsec-permissions-policy/#default-allowlists) of `*`, which bypasses the need for top-level documents to delegate permission to cross-origin iframes.
227+
This API is governed by a [Permissions Policy](https://www.w3.org/TR/permissions-policy/) with
228+
a default allowlist of `*`. This means that publishers can opt-out of the API for themselves or
229+
third parties, but by default anyone on the page can use the API. See
230+
[issue 558](https://github.com/WICG/attribution-reporting-api/issues/558) for more details.
257231
258232
### Triggering Attribution
259233

index.bs

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -112,9 +112,8 @@ Issue: Specify monkeypatches for source/trigger registration.
112112

113113
# Permissions Policy integration # {#permission-policy-integration}
114114

115-
This specification defines a [=policy-controlled feature=] identified by the string "<code><dfn noexport>attribution-reporting</dfn></code>". Its [=policy-controlled feature/default allowlist=] is `'self'`.
116-
117-
Note: In the Chromium implementation the [=policy-controlled feature/default allowlist=] is temporarily set to `*` to ease testing.
115+
This specification defines a [=policy-controlled feature=] identified by the string "<code><dfn noexport>attribution-reporting</dfn></code>".
116+
Its [=policy-controlled feature/default allowlist=] is <a href="https://w3c.github.io/webappsec-permissions-policy/#default-allowlist">`*`</a>.
118117

119118
# Structures # {#structures}
120119

0 commit comments

Comments
 (0)