Skip to content

Latest commit

 

History

History
87 lines (70 loc) · 5.19 KB

File metadata and controls

87 lines (70 loc) · 5.19 KB

focus-without-user-activation Policy

The focus-without-user-activation policy-controlled feature helps control the use of automated focus in a main frame or <iframe>.

What does that mean?

Automatic focus could happen through:

  • Use of autofocus attribute on a form control (e.g. <input>),
  • Use of scripted focus such as element.focus() and window.focus().

Automatic focus is potentially problematic since it provides bad embedded content with a tool to steal input focus from the top-level. The proposed feature provides a means for developers to block the use of automatic focus in nested contents.

Proposed Solution

The proposed permissions policy can be used to limit the use of automatic focus. Essentially, when the policy is disabled in a document, scripted and automatic focus will only work if the focus has been initialized through user activation. This essentially means that autofocus will be disabled (unless a new element is inserted, with autofocus, as a result of user gesture). The scripted focus will also only work if it has started with user gesture.

Details on "disabling focus"

All automated focus eventually call into the focusing steps algorithm. When the policy is disabled, this algorithm should not run.

In a nutshell:

  • Around step 4 of the spec for autofocus the algorithm should return if the policy focus-without-user-activation is disabled and the algorithm is not triggered by user activation.
  • Before starting steps for element.focus(options) the same verification for the policy and user activation should be performed.
  • Around step 2 of the spec for window.focus(), the same enforcement should be made (using the browsing context of the window itself to obtain the permissions policy state).

Using the Feature

This feature can be introduced with the HTTP headers. For instance,

Permissions-Policy: focus-without-user-activation=()

would cause the use of automatic focus in the page (and nested contexts) to fail unless it has been triggered by user activation.

To disable the feature for a specific <iframe>, the allow attribute can be used:

<iframe src="..." allow="focus-without-user-activation 'self'"></iframe>

which would block use of focus (without activation) for the document inside the <iframe> unless it is a same-origin document.

The Extra Mile

Automatic focus, in general, poses security concerns. It might be a good idea to disable this policy in all sandbox-ed frames (treat the policy as a sandbox flag).

Alternative Solutions Considered

This section lists other possible solutions that were considered during the development of the proposal outlined in this explainer.

  1. HTMLIFrameElement boolean attribute: A new disallowprogrammaticfocus boolean attribute on the HTMLIFrameElement was explored. When set, this attribute would prevent all nested iframes from taking input focus through script. An example implementation would look as follows:

    <!DOCTYPE html>
    <html>
      <head>
        <meta charset="utf-8">
        <title>iframe steal focus prevention</title>
      </head>
      <body>
        <iframe src=""
                disallowprogrammaticfocus>
        </iframe>
      </body>
    </html>

    In this approach, the iframe would be unable to steal focus unless the user explicitly switches focus to that element.

    This approach was abandoned because it represents a heavier-weight solution compared to a permissions policy. Additionally, it would be easier for sites to adopt a new permissions policy if they are already using permissions policies to control other behaviors, rather than introducing a new HTML attribute.

  2. Alternative policy naming: An alternative policy name was considered: disallow-programmatic-focus. However, to maintain consistency with existing permissions policies, it is more appropriate to use positive polarity (where denying the policy disables the functionality) for backwards compatibility.

  3. Sandbox flag approach: The possibility of implementing this control as a sandbox flag was analyzed instead of a permissions policy.

    Adding this functionality to the sandbox would be potentially breaking, as it would immediately affect every sandboxed frame and require all sites to update their code if they needed to restore the functionality. In contrast, implementing this as a permissions policy is non-breaking: with a default allowlist of 'self', it provides an opt-in control mechanism that is enabled by default everywhere but can be selectively disabled when needed.