I'm not sure if checking that in the browser would make sense here because the allow attribute restriction is specified in the DOM and the browser process isn't involved. I did ask this in the slack channel and pretty much got the same response that the renderer should be enforcing this check. If you have any other ideas though, then please let me know!
From: Dave Tapuska <[email protected]> Sent: Wednesday, October 27, 2021 2:27 PM To: Anupam Snigdha <[email protected]> Cc: [email protected]; [email protected]; [email protected]; Bo Cupp <[email protected]>; Scott Low <[email protected]>; [email protected]; [email protected] Subject: Re: [blink-dev] RE: [EXTERNAL] Re: Intent to Implement and Ship: Feature policy for Keyboard API I was looking at the implementation of this. Is it possible to move the check of the policy to be based in the browser when the map is fetched? As of right now the policy enforcement is on the renderer side, so a compromised renderer can request the keyboard map. dave. On Wed, Oct 27, 2021 at 4:53 PM 'Anupam Snigdha' via blink-dev <[email protected]<mailto:[email protected]>> wrote: Created an issue to get feedback from TAG: https://github.com/w3ctag/design-reviews/issues/685<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fw3ctag%2Fdesign-reviews%2Fissues%2F685&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268251129%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=%2FQQPxFtkWm7mlvljFCgRJqjQYTK7vA6SOUa%2FTKoxDcw%3D&reserved=0> I added this to the webappsec-permission policy: https://github.com/w3c/webappsec-permissions-policy/pull/428<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fw3c%2Fwebappsec-permissions-policy%2Fpull%2F428&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268261122%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=3huSRtIRvPEdaKXk0FRkPNSHWNgxUEtAAqt%2BP3BgWpo%3D&reserved=0>, but will also create an issue to investigate Permissions API integration. Thanks! From: Alex Russell <[email protected]<mailto:[email protected]>> Sent: Thursday, October 21, 2021 12:21 PM To: blink-dev <[email protected]<mailto:[email protected]>> Cc: Yoav Weiss <[email protected]<mailto:[email protected]>>; Anupam Snigdha <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]> <[email protected]<mailto:[email protected]>>; Bo Cupp <[email protected]<mailto:[email protected]>>; Scott Low <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]> <[email protected]<mailto:[email protected]>>; Domenic Denicola <[email protected]<mailto:[email protected]>> Subject: Re: [blink-dev] RE: [EXTERNAL] Re: Intent to Implement and Ship: Feature policy for Keyboard API Not consulting the TAG in this instance may have been an error. In general, we should be putting things into consistent surfaces that they affect. In this case, it seems like we're missing integrations w/ the Permissions API. I'm LGTM2 on this intent contingent on a commitment to follow up w/ the TAG as an FYI and a commitment to investigate Permissions API integration. Best Regards, Alex On Sunday, October 17, 2021 at 10:16:58 PM UTC-7 Yoav Weiss wrote: LGTM1 On Sat, Oct 16, 2021 at 12:35 AM Domenic Denicola <[email protected]<mailto:[email protected]>> wrote: Just chiming in from the sidelines: in general I think this sort of exposure via permissions policies is a good thing, and should be encouraged. It shouldn't have any additional concerns for an API like this which is about exposing information: * Same-origin iframes can already call top.navigator.keyboard.getLayoutMap() * The parent can call navigator.keyboard.getLayoutMap(), serialize the information, and send it to any cross-origin descendants that it wants to receive that information via postMessage(). Permissions policy just streamlines this: same-origin iframes now don't need to go via top, and the parent can avoid writing custom code to communicate the information to cross-origin descendants, instead replacing it with a simple allow="keyboard-map" or allow="keyboard-map https://specific-origin". I hope the API owners can support this kind of improvement to the platform, not only for this case but in general whenever we introduce ergonomic permissions policy-based delegation for any feature. On Fri, Oct 15, 2021 at 6:00 PM 'Anupam Snigdha' via blink-dev <[email protected]<mailto:[email protected]>> wrote: getLayoutMap() can already be accessed by the top level browsing context and I believe it does have fingerprinting concerns: a site can gain knowledge of the keyboard layout of the user even before the user has typed anything. Try this site switching between French and English keyboard layouts: https://fortunate-onyx-wren.glitch.me/french-or-english.html<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Ffortunate-onyx-wren.glitch.me%2Ffrench-or-english.html&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268271118%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=Un16Kmy1207Jykvs72lWQhwtpDB367iBUS1Cc3bmNxI%3D&reserved=0>. The privacy mitigation section<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwicg.github.io%2Fkeyboard-map%2F%23privacy-mitigations&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268271118%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=n%2BtK2a27cpzCEtih%2F4biHKAp76xMkJUoyZC%2FFISamCA%3D&reserved=0> describes some mitigations we could add for fingerprinting related concerns. I don't think exposing this by default to same origin iframes and allowing the top-level browsing context to delegate its authority to use getLayoutMap() to other iframes increases the concern any. If I'm thinking about that wrong please let me know. For the privacy section: I'll make a change to add permission policy along with the top level browsing context restriction to the spec. From: Yoav Weiss <[email protected]<mailto:[email protected]>> Sent: Friday, October 15, 2021 5:46 AM To: blink-dev <[email protected]<mailto:[email protected]>> Cc: Anupam Snigdha <[email protected]<mailto:[email protected]>>; Bo Cupp <[email protected]<mailto:[email protected]>>; Scott Low <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]> <[email protected]<mailto:[email protected]>>; Yoav Weiss <[email protected]<mailto:[email protected]>> Subject: Re: [EXTERNAL] Re: Intent to Implement and Ship: Feature policy for Keyboard API Reading through https://wicg.github.io/keyboard-map/#privacy<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwicg.github.io%2Fkeyboard-map%2F%23privacy&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268281114%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=%2BxpMmo1sqMLm185lgCq8OuyIgZKllHIiEBuz%2B2CAZc8%3D&reserved=0> the only risk here is increased fingerprinting surface. Is that correct? (aside - the privacy section states that the API is only available in top-level contexts. You probably want to change that) On Thursday, October 14, 2021 at 10:09:04 PM UTC+2 snianu wrote: Can you clarify what the current situation is? getLayoutMap() which is part of the Keyboard API can only be accessed in the top browsing context which cuts off access from same and cross origin iframes. With this permission policy based solution, the default value would be "Self" that grants access to same origin iframe by-default, but requires web authors to add the "keyboard-map" value to allow attribute in order to grant access within cross-origin iframes. IIUC, currently layout maps are not available at all to iframes. Is that correct? Correct. Also, are you suggesting to add a permission policy that would enable it by default for same-origin iframes, and enable explicit delegation for cross-origin iframes? Yes. -Anupam From: Yoav Weiss <[email protected]<mailto:[email protected]>> Sent: Thursday, October 14, 2021 12:29 PM To: blink-dev <[email protected]<mailto:[email protected]>> Cc: Anupam Snigdha <[email protected]<mailto:[email protected]>>; Bo Cupp <[email protected]<mailto:[email protected]>>; Scott Low <[email protected]<mailto:[email protected]>>; [email protected]<mailto:[email protected]> <[email protected]<mailto:[email protected]>> Subject: [EXTERNAL] Re: Intent to Implement and Ship: Feature policy for Keyboard API On Tuesday, October 12, 2021 at 12:33:19 AM UTC+2 snianu wrote: Contact emails [email protected]<mailto:[email protected]> Explainer https://github.com/WICG/keyboard-map/issues/38<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FWICG%2Fkeyboard-map%2Fissues%2F38&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268291103%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=4VDVM8kpDEixMO3xEnq%2FcqFLcz6euA5NqV%2BO9pidzas%3D&reserved=0> Specification https://wicg.github.io/keyboard-map/#permissions-policy<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwicg.github.io%2Fkeyboard-map%2F%23permissions-policy&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268301101%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=%2B9IR8y1iyYrKrhabUlNpNQQK%2FF4cq80k5Kbt74n1tC8%3D&reserved=0> Summary getLayoutMap() used in conjunction with code solves the problem of identifying the actual key pressed in keyboard with different layout maps such as English vs French keyboards, but since getLayoutMap() isn't available in all contexts (can't be used inside iframes), Office web apps like Excel, Word, PowerPoint, etc. that show up as embedded experiences in Outlook Web, Teams, etc. and are running in iframes, can't use this API. Adding keyboard-map to the allow attribute list solves this problem. Can you clarify what the current situation is? IIUC, currently layout maps are not available at all to iframes. Is that correct? Also, are you suggesting to add a permission policy that would enable it by default for same-origin iframes, and enable explicit delegation for cross-origin iframes? See this<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FWICG%2Fkeyboard-map%2Fissues%2F38&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268311098%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=qqAd%2BfesRM%2FineyQxCPnQQUT8lKgUTmI5%2Fvtc5MZ3h0%3D&reserved=0> Github issue for more info. Blink component Blink<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugs.chromium.org%2Fp%2Fchromium%2Fissues%2Flist%3Fq%3Dcomponent%3ABlink&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268311098%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=RM9yTJSC70QE5EutPfEMuEthdBb7IsfJsGEZd0bqk8E%3D&reserved=0> Search tags keyboard-map<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.chromestatus.com%2Ffeatures%23tags%3Akeyboard-map&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268321089%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=ZExc4SxFgMgDXqkkiE7cTVnXFoS%2BCM7H29Kr3SyQoeg%3D&reserved=0>, Keyboard<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.chromestatus.com%2Ffeatures%23tags%3AKeyboard&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268331086%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=VKRcXfUzjP99oQsXd5m%2F9squq3fskqMDhi6C3ugwrcc%3D&reserved=0> TAG review Not applicable as this is API has been shipped. TAG review status Not applicable Risks Interoperability and Compatibility Currently Keyboard API is not supported on Safari and Firefox so interop risk is minimal. Moreover, this proposal only allows the usage of the Keyboard API inside an iframe if it's explicitly specified in the allow attribute list by the web author. The feature policy names are based on the permission names, which have been part of the permission policy spec<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fw3c.github.io%2Fwebappsec-permissions-policy%2F&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268341077%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=uyaicPuKSt26ZAqu9laR0f5JK9c7Ajngpz7wEZW8esA%3D&reserved=0>. Gecko: Negative (https://github.com/mozilla/standards-positions/pull/310<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fmozilla%2Fstandards-positions%2Fpull%2F310&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268341077%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=1sCHcSZjcHnvqv6wkXu660QJiNv2dGIntjvm8UBRCTs%3D&reserved=0>) WebKit: Negative (https://github.com/WICG/keyboard-map/issues/30#issue-487691188<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FWICG%2Fkeyboard-map%2Fissues%2F30%23issue-487691188&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268351073%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=1tolxD4eajJtXm7vV5PI4bGa%2B7Rsjsje8fzQTpDKN7w%3D&reserved=0>) Web developers: Positive (https://github.com/WICG/keyboard-map/issues/38#issue-934823530<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2FWICG%2Fkeyboard-map%2Fissues%2F38%23issue-934823530&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268361067%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=WRwiva6ucZ0qH1tb5%2FIVwZJfm6cW2H73xnXnTiwYvbg%3D&reserved=0>) Ergonomics None. Activation None. Security While there are fingerprinting concerns, this API has been shipped in Chrome 69 and adding to the allow attribute list (like HID, clipboard-read/write etc) allows sites like Office web apps to use this API. The default value would be "self" (= top-level browsing context) but sites could add it to allow list to access within iframe context. Debuggability The allow attribute has basic tooling support as described in this<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fdocs.google.com%2Fdocument%2Fd%2F1eJn5QIX4JFGackDYmdLxWXEmTDkSGj_ZGz5XY4uCKbY%2Fedit&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268371063%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=wisKdWoOpViQF8OJxY7wFbdGrGBNynmflSneq3ymQX4%3D&reserved=0> doc. Is this feature fully tested by web-platform-tests<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fchromium.googlesource.com%2Fchromium%2Fsrc%2F%2B%2Fmaster%2Fdocs%2Ftesting%2Fweb_platform_tests.md&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268381056%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=WqeL9zGZcL8x1GfcfUPROtab2Ya3bKgHdYmoL9HzQ%2FE%3D&reserved=0>? Yes Requires code in //chrome? False Tracking bug https://bugs.chromium.org/p/chromium/issues/detail?id=1258242<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fbugs.chromium.org%2Fp%2Fchromium%2Fissues%2Fdetail%3Fid%3D1258242&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268381056%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=2ZtqmY4DDHDP2QZ1e%2Fos7xToGrH77d0DklMXVW001Fk%3D&reserved=0> Estimated milestones 97 Link to entry on the Chrome Platform Status https://www.chromestatus.com/feature/5657965899022336<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.chromestatus.com%2Ffeature%2F5657965899022336&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268391052%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=vXocstrXTszKJsee2vjODM985oM8rrp4HbIaOwSYm8A%3D&reserved=0> This intent message was generated by Chrome Platform Status<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fwww.chromestatus.com%2F&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268401446%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=z0rsoQ5KtolpCGKAHXv1ORxCmjH3YkOx9cl6lk2AcIE%3D&reserved=0>. -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]<mailto:[email protected]>. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/BL0PR00MB038743E3690A397D6851C7F5CFB99%40BL0PR00MB0387.namprd00.prod.outlook.com<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FBL0PR00MB038743E3690A397D6851C7F5CFB99%2540BL0PR00MB0387.namprd00.prod.outlook.com%3Futm_medium%3Demail%26utm_source%3Dfooter&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268411040%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=tym1cG56v4dlJjomylzvKIyx3Sn1AD7v37kAb6VagmE%3D&reserved=0>. -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]<mailto:[email protected]>. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/DM5PR00MB039046006135653C635811A0CF859%40DM5PR00MB0390.namprd00.prod.outlook.com<https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgroups.google.com%2Fa%2Fchromium.org%2Fd%2Fmsgid%2Fblink-dev%2FDM5PR00MB039046006135653C635811A0CF859%2540DM5PR00MB0390.namprd00.prod.outlook.com%3Futm_medium%3Demail%26utm_source%3Dfooter&data=04%7C01%7Csnianu%40microsoft.com%7C65051870c3d842ee922008d999908204%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C637709668268421041%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=mQ0u%2BFU8xUIPBPtTkVGGnR8O65dsSJyrpUJRz7wyweM%3D&reserved=0>. -- You received this message because you are subscribed to the Google Groups "blink-dev" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. To view this discussion on the web visit https://groups.google.com/a/chromium.org/d/msgid/blink-dev/DM5PR00MB0390878B0E6D335456F31C27CF859%40DM5PR00MB0390.namprd00.prod.outlook.com.
