-
Notifications
You must be signed in to change notification settings - Fork 149
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tpac2023 charter comments #635
Conversation
… Source Code Transparency
LGTM. Thanks for pulling this together!
|
This looks great, any reason we need to include cookie layering here? Besides the WG note which will be important to the effort, I think we'll mostly handle execution in WHATWG. |
Hey @johannhof! I didn't realize that was the plan, but if it's going to be a WHATWG product, then we can certainly leave it out. |
I think so, but @annevk may have additional thoughts. |
🤷 I'm happy for it to go elsewhere, it just wasn't clear to me that it already had a home. :) |
Thanks for offering to host this work 💜 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It seems these deliverables have some kind of conflict with the WHATWG HTML Workstream:
- Page Embedded Permission Control (PEPC)
- Sandbox allow-unique-origin
It would help to have some clarity here.
Good point. The framing on those should be "These are incubations we should pay attention to and discuss, as they fall within the scope of security work the group is responsible for.", not "We're going to take these to REC." I imagine both would end up in HTML if they incubate successfully. |
btw, regarding Request-OTR, it wasn't clear to me that it should be a deliverable of webappsec or we should leave it to the IETF to handle. cc @mnot |
I chose to move PECP and Unique Origin into the liaison section with WHATWG. An alternative would be to keep it as a potential work item but also commit to move it to the WHATWG HTML stream once mature (like we're doing for the Fetch metatada). Waiting on @annevk to weigh in on cookie layering before adding it to the charter. |
HTTP WG discussed Request-OTR at IETF117; general feeling was that WebAppSec (or perhaps Privacy CG, depending on how mature it is / how much implementer interest there is) was more appropriate. Feel free to loop us in for the HTTP aspects (e.g., header design). |
@plehegar, is there anything else to do here, or shall I merge this PR? |
In case you were blocked on me. Cookie layering is essentially these things:
While I'm sure these changes will be discussed in a variety of venues, I don't think they need to be in scope of additional groups. |
Horizontal review of charter requested. follow at w3c/strategy#426 |
@@ -613,6 +672,10 @@ <h2>Success Criteria</h2> | |||
TAG <a href="https://www.w3.org/TR/design-principles/">Web Platform Design Principles</a>. | |||
</p> | |||
|
|||
<p> | |||
All new features should be supported by at least two intents to implement before being |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
:(
This implements the items from our TPAC 2023 discussion.
This adds items on the REC-track, allows the WG to adopt items from incubation without rechartering, switch the group to living CR, update the liaisons.
Items that did not generate a change in the charter: