LGTM3

On Wed, Jul 16, 2025 at 11:13 AM Vladimir Levin <vmp...@chromium.org> wrote:

> Thanks Stephen, that makes sense.
>
> LGTM2
>
> On Tuesday, July 15, 2025 at 3:20:00 PM UTC-4 Slobodan Pejic wrote:
>
>> Thanks Domenic, I have filed an issue to address this problem with the
>> secure-payment-confirmation specification (#307
>> <https://github.com/w3c/secure-payment-confirmation/issues/307>).
>>
>> On Monday, July 14, 2025 at 10:09:19 PM UTC-4 Domenic Denicola wrote:
>>
>>> This generally looks good, but there's a bit of a hole in the spec which
>>> makes it unclear whether CSP, etc. apply to these image fetches: see
>>> https://github.com/w3c/image-resource/issues/48 . (The SPC spec calls
>>> "Fetch an image resource" with no request supplied, but the Image Resource
>>> spec is broken in that case.)
>>>
>>> On Tue, Jul 15, 2025 at 3:13 AM Alex Russell <slightly...@chromium.org>
>>> wrote:
>>>
>>>> LGTM1; my view is that each browser team is managing risk about
>>>> browser-presented UI and that nothing about this forces anyone to display
>>>> anything.
>>>>
>>>> Best,
>>>>
>>>> Alex
>>>>
>>>> On Thursday, July 10, 2025 at 11:24:51 AM UTC-7 Nina Satragno wrote:
>>>>
>>>>> El mié, 9 jul 2025 a la(s) 12:11 p.m., Stephen Mcgruer (
>>>>> smcgr...@chromium.org) escribió:
>>>>>
>>>>>> > Hey, with regards to providing logos. My understanding is that this
>>>>>> would be displayed in a trusted content. Is there some affordances to
>>>>>> clearly indicate that these logos are provided by the merchants? I'm a
>>>>>> little concerned for cases like displaying arbitrary content in trusted 
>>>>>> UI
>>>>>> because of things like hate symbols, among other things.
>>>>>>
>>>>>> Hi Vlad; you're completely right to be concerned in this regard - it
>>>>>> is a general concern with SPC. Whilst we do care about this issue, our
>>>>>> counter-argument is that there is no incentive to display misleading or
>>>>>> offensive logos using SPC.
>>>>>>
>>>>>> Firstly, if we examine the 'offensive' case - what is the value of
>>>>>> SPC here for someone who wants to offend? If I'm the website, I can 
>>>>>> render
>>>>>> offensive iconography in an HTML 'bottomsheet' UX, with a Chrome logo at
>>>>>> the top of it, and write whatever I want. Users will generally not know 
>>>>>> the
>>>>>> difference, and many will just attribute that to being from Chrome 
>>>>>> anyway.
>>>>>> We're actually not looking to present SPC as being "from Chrome" - 
>>>>>> there's
>>>>>> no logo, for example. We've historically discussed this with security, 
>>>>>> and
>>>>>> we have offered to remove the 'line of death/full screen scrim' to 
>>>>>> further
>>>>>> divorce SPC from being 'browser UX' - but so far they haven't asked us to
>>>>>> do that.
>>>>>>
>>>>>> Secondly, if we examine the 'misleading' case, we cover that in the
>>>>>> spec (here
>>>>>> <https://w3c.github.io/secure-payment-confirmation/#sctn-security-payment-attack>
>>>>>> and here
>>>>>> <https://w3c.github.io/secure-payment-confirmation/#sctn-security-merchant-data>),
>>>>>> but broadly the answer is that even if you trick the user into creating 
>>>>>> an
>>>>>> SPC cryptogram, it has no value unless you are literally processing a
>>>>>> transaction with the underlying payment providers (and they are able to
>>>>>> examine the output signed cryptogram to know exactly what data you 
>>>>>> provided
>>>>>> to the user). So as a misleading attacker, you at best end up with an SPC
>>>>>> cryptogram with no use for it.
>>>>>>
>>>>>> On Wed, 9 Jul 2025 at 12:01, Stephen Mcgruer <smcgr...@chromium.org>
>>>>>> wrote:
>>>>>>
>>>>>>> > Sorry, I didn't read the WPT PRs you linked. I see that the tests
>>>>>>> already depend on test_driver.add_virtual_authenticator(). Is there
>>>>>>> anything blocking testing here, or is it OK if shipping this is 
>>>>>>> conditional
>>>>>>> on the tests being landed?
>>>>>>>
>>>>>>> The main issue is that WebAuthn virtual authenticators are not
>>>>>>> supported on Chrome Android (as far as I know, cc @Nina Satragno
>>>>>>> <nsatra...@google.com> ), whilst this feature is shipping first for
>>>>>>> SPC in Chrome Android (with Desktop to follow in a few milestones). So
>>>>>>> they're not going to pass when initially landed (and indeed will regress
>>>>>>> SPC's wpt.fyi status in Chrome), *however* we discussed this
>>>>>>> internally yesterday and decided its still better to have tests that
>>>>>>> reflect the specification even if they now fail due to lack of test
>>>>>>> support. So our plan is to land them in the coming days (once reviewed).
>>>>>>>
>>>>>>
>>>>> This is correct, there's no virtual authenticator support for Android.
>>>>> From a WPT perspective this also seems like a reasonable approach to me.
>>>>>
>>>>>
>>>>>>
>>>>>>> On Wed, 9 Jul 2025 at 11:21, Philip Jägenstedt <foo...@chromium.org>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> Sorry, I didn't read the WPT PRs you linked. I see that the tests
>>>>>>>> already depend on test_driver.add_virtual_authenticator(). Is there
>>>>>>>> anything blocking testing here, or is it OK if shipping this is 
>>>>>>>> conditional
>>>>>>>> on the tests being landed?
>>>>>>>>
>>>>>>>> On Wed, Jul 9, 2025 at 5:17 PM Philip Jägenstedt <
>>>>>>>> foo...@chromium.org> wrote:
>>>>>>>>
>>>>>>>>> Hey Stephen,
>>>>>>>>>
>>>>>>>>> Is WebAuthn virtual authenticators the DevTools feature mentioned
>>>>>>>>> in https://developer.chrome.com/docs/devtools/webauthn?
>>>>>>>>>
>>>>>>>>> If you need powerful test automation for WebAuthn, have you had a
>>>>>>>>> look at what's currently possible with WebDriver BiDi and 
>>>>>>>>> testdriver.js?
>>>>>>>>> Recently
>>>>>>>>> <https://github.com/web-platform-tests/wpt/commits/0fc79d8e619d1ab680b2688e8ec6b9dd51b19b26/resources/testdriver.js>
>>>>>>>>>  a
>>>>>>>>> lot of previously "too hard" features have been added to 
>>>>>>>>> testdriver.js, and
>>>>>>>>> there might be a pattern you can follow there.
>>>>>>>>>
>>>>>>>>> Best regards,
>>>>>>>>> Philip
>>>>>>>>>
>>>>>>>>> On Thu, Jul 3, 2025 at 7:29 PM Stephen Mcgruer <
>>>>>>>>> smcgr...@chromium.org> wrote:
>>>>>>>>>
>>>>>>>>>> (Also, -chrome-payments-eng@ as that is an internal group that
>>>>>>>>>> will not accept email from @chromium.org or other external
>>>>>>>>>> accounts :))
>>>>>>>>>>
>>>>>>>>>> On Thu, 3 Jul 2025 at 13:26, Stephen Mcgruer <
>>>>>>>>>> smcgr...@chromium.org> wrote:
>>>>>>>>>>
>>>>>>>>>>> Quick clarification here:
>>>>>>>>>>>
>>>>>>>>>>> > Is this feature fully tested by web-platform-tests?
>>>>>>>>>>> > No
>>>>>>>>>>>
>>>>>>>>>>> We are working on adding tests, but since the SPC WPTs rely on
>>>>>>>>>>> WebAuthn virtual authenticators, and those are not available on 
>>>>>>>>>>> Chrome
>>>>>>>>>>> Android, we are having to test them manually as we develop. When 
>>>>>>>>>>> these
>>>>>>>>>>> features are implemented for Desktop then things should start 
>>>>>>>>>>> working
>>>>>>>>>>> better!
>>>>>>>>>>>
>>>>>>>>>>>    - https://github.com/web-platform-tests/wpt/pull/53358
>>>>>>>>>>>    (paymentEntityLogos)
>>>>>>>>>>>    - https://github.com/web-platform-tests/wpt/pull/53333
>>>>>>>>>>>    (instrument.details)
>>>>>>>>>>>    - https://github.com/web-platform-tests/wpt/pull/53386 (new
>>>>>>>>>>>    output states)
>>>>>>>>>>>
>>>>>>>>>>>
>>>>>>>>>>> On Thu, 3 Jul 2025 at 12:14, Chromestatus <
>>>>>>>>>>> ad...@cr-status.appspotmail.com> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> Contact emails darwiny...@chromium.org, slobo...@chromium.org,
>>>>>>>>>>>> smcgr...@chromium.org
>>>>>>>>>>>>
>>>>>>>>>>>> Explainer
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/197
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/275
>>>>>>>>>>>>
>>>>>>>>>>>> Specification https://w3c.github.io/secure-payment-confirmation
>>>>>>>>>>>>
>>>>>>>>>>>> Design docs
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/197
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/issues/275
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/292
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/294
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/298
>>>>>>>>>>>>
>>>>>>>>>>>> Summary
>>>>>>>>>>>>
>>>>>>>>>>>> Updates the UX elements for the SPC dialog on Android Chrome.
>>>>>>>>>>>> Other than just UX presentation the following are being added: - 
>>>>>>>>>>>> Allowing
>>>>>>>>>>>> merchants to provide an optional list of payment entity logos 
>>>>>>>>>>>> related to
>>>>>>>>>>>> the payment that will be displayed in the UX (
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/294).
>>>>>>>>>>>> - Returning different output states back to the merchant depending 
>>>>>>>>>>>> on
>>>>>>>>>>>> whether the user wants to continue the transaction without SPC or 
>>>>>>>>>>>> to cancel
>>>>>>>>>>>> the transaction (
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/292).
>>>>>>>>>>>> Currently, we only send a single output state back for both cases. 
>>>>>>>>>>>> - A new
>>>>>>>>>>>> payment detail label field will be added to the payment instrument 
>>>>>>>>>>>> so the
>>>>>>>>>>>> text be presented across 2 lines in SPC (
>>>>>>>>>>>> https://github.com/w3c/secure-payment-confirmation/pull/298)
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Blink component Blink>Payments
>>>>>>>>>>>> <https://issues.chromium.org/issues?q=customfield1222907:%22Blink%3EPayments%22>
>>>>>>>>>>>>
>>>>>>>>>>>> TAG review N/A (minor additive features)
>>>>>>>>>>>>
>>>>>>>>>>>> TAG review status Not applicable
>>>>>>>>>>>>
>>>>>>>>>>>> Risks
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Interoperability and Compatibility
>>>>>>>>>>>>
>>>>>>>>>>>> Low risk. The SPC UX Refresh changes are only purely additive
>>>>>>>>>>>> API shapes that are all backwards compatible. The risk is that 
>>>>>>>>>>>> other
>>>>>>>>>>>> browser do not implement it.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> *Gecko*: No signal (
>>>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/570)
>>>>>>>>>>>> Firefox has never finalized their view on SPC, so we updated the 
>>>>>>>>>>>> original
>>>>>>>>>>>> SPC issue with a note on this additional capability.
>>>>>>>>>>>>
>>>>>>>>>>>> *WebKit*: No signal (
>>>>>>>>>>>> https://github.com/WebKit/standards-positions/issues/30)
>>>>>>>>>>>> Safari has never finalized their view on SPC, so we updated the 
>>>>>>>>>>>> original
>>>>>>>>>>>> SPC issue with a note on this additional capability.
>>>>>>>>>>>>
>>>>>>>>>>>> *Web developers*: Positive Responding to requests/feedback
>>>>>>>>>>>> from web developers in the WPWG.
>>>>>>>>>>>>
>>>>>>>>>>>> *Other signals*:
>>>>>>>>>>>>
>>>>>>>>>>>> WebView application risks
>>>>>>>>>>>>
>>>>>>>>>>>> Does this intent deprecate or change behavior of existing APIs,
>>>>>>>>>>>> such that it has potentially high risk for Android WebView-based
>>>>>>>>>>>> applications?
>>>>>>>>>>>>
>>>>>>>>>>>> None
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Debuggability
>>>>>>>>>>>>
>>>>>>>>>>>> Web developers should be able to try the new SPC UX Refresh
>>>>>>>>>>>> through a Chrome flag, thus no changes are needed in devtools.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Will this feature be supported on all six Blink platforms
>>>>>>>>>>>> (Windows, Mac, Linux, ChromeOS, Android, and Android WebView)?
>>>>>>>>>>>> No
>>>>>>>>>>>>
>>>>>>>>>>>> SPC UX Refresh is added to Secure Payment Confirmation which is
>>>>>>>>>>>> supported only on Android, Windows, and Mac.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>>>>>>>> ? No
>>>>>>>>>>>>
>>>>>>>>>>>> DevTrial instructions
>>>>>>>>>>>> https://docs.google.com/document/d/1w3RfvmoQqCvJkio4rxl0QR4BL1AzgHdv9a0qJhfCzpg
>>>>>>>>>>>>
>>>>>>>>>>>> Flag name on about://flags
>>>>>>>>>>>> enable-secure-payment-confirmation-ux-refresh
>>>>>>>>>>>>
>>>>>>>>>>>> Finch feature name SecurePaymentConfirmationUxRefresh
>>>>>>>>>>>>
>>>>>>>>>>>> Rollout plan Will ship enabled for all users
>>>>>>>>>>>>
>>>>>>>>>>>> Requires code in //chrome? False
>>>>>>>>>>>>
>>>>>>>>>>>> Tracking bug https://g-issues.chromium.org/issues/405173922
>>>>>>>>>>>>
>>>>>>>>>>>> Launch bug https://launch.corp.google.com/launch/4397413
>>>>>>>>>>>>
>>>>>>>>>>>> Measurement SPC UX Refresh is only additive to Secure Payment
>>>>>>>>>>>> Confirmation: The Secure Payment Confirmation UseCounter will be 
>>>>>>>>>>>> used.
>>>>>>>>>>>>
>>>>>>>>>>>> Availability expectation Secure Payment Confirmation is only
>>>>>>>>>>>> in Chromium browsers for the foreseeable future.
>>>>>>>>>>>>
>>>>>>>>>>>> Non-OSS dependencies
>>>>>>>>>>>>
>>>>>>>>>>>> Does the feature depend on any code or APIs outside the
>>>>>>>>>>>> Chromium open source repository and its open-source dependencies to
>>>>>>>>>>>> function?
>>>>>>>>>>>> None
>>>>>>>>>>>>
>>>>>>>>>>>> Sample links
>>>>>>>>>>>> https://rsolomakhin.github.io/pr/spc-payment-entities-logos
>>>>>>>>>>>> https://rsolomakhin.github.io/pr/spc-opt-out
>>>>>>>>>>>>
>>>>>>>>>>>> Estimated milestones
>>>>>>>>>>>> Shipping on Android 139
>>>>>>>>>>>> DevTrial on Android 139
>>>>>>>>>>>>
>>>>>>>>>>>> Anticipated spec changes
>>>>>>>>>>>>
>>>>>>>>>>>> Open questions about a feature may be a source of future web
>>>>>>>>>>>> compat or interop issues. Please list open issues (e.g. links to 
>>>>>>>>>>>> known
>>>>>>>>>>>> github issues in the project for the feature specification) whose
>>>>>>>>>>>> resolution may introduce web compat/interop risk (e.g., changing 
>>>>>>>>>>>> to naming
>>>>>>>>>>>> or structure of the API in a non-backward-compatible way).
>>>>>>>>>>>> None
>>>>>>>>>>>>
>>>>>>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>>>>>>> https://chromestatus.com/feature/5206050462236672?gate=5106969593249792
>>>>>>>>>>>>
>>>>>>>>>>>> Links to previous Intent discussions Intent to Prototype:
>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/683f5e54.170a0220.31427f.1558.GAE%40google.com
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> This intent message was generated by Chrome Platform Status
>>>>>>>>>>>> <https://chromestatus.com>.
>>>>>>>>>>>>
>>>>>>>>>>> --
>>>>>>>>>> You received this message because you are subscribed to the
>>>>>>>>>> Google Groups "blink-dev" group.
>>>>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>>>>> send an email to blink-dev+unsubscr...@chromium.org.
>>>>>>>>>> To view this discussion visit
>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADY3MafTfsu-e69p_8ixAyLvfj0VnVuxs%3DT95w55UbeDSKKr5g%40mail.gmail.com
>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CADY3MafTfsu-e69p_8ixAyLvfj0VnVuxs%3DT95w55UbeDSKKr5g%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>> .
>>>>>>>>>>
>>>>>>>>>
>>>>>
>>>>> --
>>>>> Nina Satragno
>>>>>
>>>> --
>>>> You received this message because you are subscribed to the Google
>>>> Groups "blink-dev" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>> an email to blink-dev+unsubscr...@chromium.org.
>>>>
>>> To view this discussion visit
>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/bbcefa96-47c5-4ad2-8f38-d735fd94e63an%40chromium.org
>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/bbcefa96-47c5-4ad2-8f38-d735fd94e63an%40chromium.org?utm_medium=email&utm_source=footer>
>>>> .
>>>>
>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFUtAY_3eLs7ju0bZAsFAMTDh1yOMBLk10kX%2BmFhUoLbmGDQEw%40mail.gmail.com.

Reply via email to