first-party-sets icon indicating copy to clipboard operation
first-party-sets copied to clipboard

Can web apps leverage First Party Sets for their app scope?

Open alancutter opened this issue 1 year ago • 2 comments

Web apps are sites that can be installed on a user's device appearing similar to a native app. As a safety mechanism the user the user agent shows warning UI when they navigate outside of the app's URL scope while in a web app window.

Example: Navigating to https://google.com in the Twitter web app. Screenshot from 2023-04-12 16-21-40

Currently a web app's URL scope is tied to a single origin which is a problem for sites that span multiple origins. There is an existing effort to extend web app scopes multi origin via a scope_extensions manifest field.

Do you think First Party Sets could serve the web app multi origin scope use case and dedup much of this effort?

alancutter avatar Apr 12 '23 06:04 alancutter

Thanks for the idea, @alancutter. This sounds similar to the proposal in #46, could you confirm? If yes, may we continue the discussion on that issue?

krgovind avatar Apr 18 '23 14:04 krgovind

That's on a specific concern with integrating the two, I would like to get thoughts on the high level idea of whether they are overlapping.

My current read of it (in discussion with @mgiuca) is that First Party Sets is highly concerned about data sharing between origins because of the risk of internet wide user tracking. To mitigate this risk FPS is going to use a curated global list of internet properties to limit sets of origins from sprawling out of control.

For web app scope_extensions the multi origin associations will not facilitate data sharing and doesn't come with the same tracking risks, just different UX treatment. For this reason it is okay for scope_extensions to not use a centralised list and instead allow origins to mutually associated each other via web-app-origin-association.json files.

Does this high level take sound reasonable?

alancutter avatar Apr 20 '23 06:04 alancutter