The Portals proposal is not currently being actively pursued.
Many of the capabilities that Portals would have enabled are being explored in other proposals:
This repository is thus effectively archived for the time being.
Portals enable seamless and instant navigations between pages. In particular, we propose a new <portal>
HTML element which enables a page to show another page as an inset, and then activate it to perform a seamless transition to a new state, where the formerly-inset page becomes the top-level document.
Portals are part of a general effort toward privacy-conscious, well-specified prerendering. They go beyond basic prerendering support by also providing the inset preview of the content. This makes them suitable for seamless navigations, not just instant ones; for example, they enable web-developer-controlled navigation transitions between the referring page and the prerendered page. Their inset form also can serve as a more-private and more-secure form of an iframe, in certain cases.
A document can include a <portal>
element, which prerenders the specified URL in the portal:
<portal id="myPortal" src="https://example.com/"></portal>
This prerenders https://example.com/
in a prerendering browsing context, which imposes certain restrictions such as no use of permission-requiring APIs, or no access to storage in the cross-origin case. Importantly, cross-origin content will need to opt in to such prerendering.
But unlike other prerendering technologies, where the prerendering takes place entirely offscreen, the portal element shows a preview of the prerendered content. In this way it is somewhat like an iframe, providing a rendered view of another page. Note, however, that a portal's preview is much more restricted than the general embedding mechanism iframes provide; e.g., user interaction with does not pass through to the portaled content.
When the portaled content is same-origin, the embedding page can communicate with it using
myPortal.postMessage(data);
This can be useful to coordinate the preview displayed. However, when the portaled content is cross-origin, postMessage()
does not function, so as to prevent cross-site tracking.
While all prerendered content can be activated, becoming fully-rendered top-level content, portals expose this ability to web developers directly. That is, while other prerendering technologies rely on the browser to implicitly activate the prerendered content, with portals the web developer can call
myPortal.activate();
which causes the embedding window to navigate, replacing its document with the prerendered one. At this point, the user will observe that their browser has navigated to https://example.com/
, e.g., via changes to the URL bar contents and back/forward UI. Since https://example.com/
was already loaded and prerendered in the portal context, this navigation will occur seamlessly and instantly, without a network round-trip or document re-initialization.
For more advanced use cases, the https://example.com/
document can react to activation, using the portalactivate
event. It can use this event to adapt itself to its new context. For example, if the page was only showing preview content while in a portal, it can switch to showing the full content of the page. The page can also adopt its predecessor (the document which previously occupied the tab) into a new portal context.
window.addEventListener('portalactivate', e => {
document.body.classList.add('displayed-fully');
document.requestStorageAccess().then(() => {
document.getElementById('user').textContent = localStorage.getItem('current-user');
});
let predecessor = e.adoptPredecessor(document);
console.assert(predecessor instanceof HTMLPortalElement);
document.body.appendChild(predecessor);
});
If https://example.com/
does not need to adapt portal-specific content when activated and does not need the predecessor-adoption capability, then it can instead use the generic APIs for reacting to prerendering activation or other relevant changes, outlined in that explainer.
As a more realistic example, consider a page which wants to prerender a link and provide a seamless navigation transition when it's clicked. It can do this by hiding the portal until the link is clicked, and then animating the portal to full screen before activation.
This might be written like so:
<a href="https://example.com/" class="seamless">Click me!</a>
<script>
for (const link of document.querySelectorAll('a.seamless')) {
const portal = document.createElement('portal');
portal.src = link.href;
portal.hidden = true;
portal.style = 'position: fixed; top: 0; left: 0; width: 10vw; height: 10vh;';
document.body.append(portal);
link.onclick = async e => {
if (portal.state === 'empty') {
// The content couldn't be portaled, likely because it didn't opt-in.
// Let the normal link click go through.
return;
}
e.preventDefault();
// Show the portal, and animate it to the whole viewport over 300 milliseconds.
if (!matchMedia('(prefers-reduced-motion: reduce)').matches) {
portal.hidden = false;
await portal.animate([{ width: '100vw', height: '100vh' }], { duration: 300 }).finished;
}
// Once the preview is now displayed as the whole viewport, activate.
// This performs the instant navigation/URL bar update/etc.
try {
await portal.activate();
} catch {
// If activation failed, restore the portal to hidden (so that back-navigations
// don't show the full-viewport portal), and fall back to a normal navigation.
portal.hidden = true;
portal.style.width = '10vw';
portal.style.height = '10vh';
location.href = link.href;
}
};
}
</script>
See the "Key Scenarios" document for more detail on each of these, including visualizations.
Navigation transitions: prerendering opens the door for more elaborate transitions, by displaying the portal in some form, animating it (using resizing, translations, etc.) until it occupies the full viewport, then finally activating the portal to perform the instant navigation. See above for a simple example of this.
Aggregation: multiple portals on the same page can be used to create more elaborate experiences, where the user chooses which portal to activate. This category of use cases includes cases like a news reader, a shopping site, an infinite scrolling list of articles, etc. By using a portal instead of (or in addition to) a link, the aggregated content has the opportunity to display a preview, and to benefit from pre-rendering and navigation transitions.
Additionally, by using the ability to adopt the predecessor during the portalactivate
event, more complicated interactions between the aggregator and the aggregated content can be built, such as retaining a portion of the shopping site or article-list UI in a portal even after navigating to an individual page.
"Better iframe": portals encompass some, but not all, of the use cases for iframes. And they do so in a way that is better for users, in terms of security and privacy. They also remove a lot of the legacy baggage and sharp edges that come with iframes, making them easier to use for web developers. So for cases where the only relevant interaction is activation, without a need for manipulation or scrolling of the embedded content, portals can provide an alternative to iframes that improve privacy, security, and ergnomics.
See below for a more detailed summary of the differences between portals and iframes.
Goals:
Enable seamless navigations from a page showing a portal, to the portaled page
Enable seamless navigations between pages of a portal-aware website
Enable developer control over the activation of prerendered content, to provide more custom experiences than the browser's default navigation pattern
Avoid the characteristics of iframes which have negative impacts on security, privacy, and performance
Non-goals:
Built-in support for high-level navigation patterns, such as carousels or infinite lists. Portals provide a low-level building block for prerendering with preview, which can be combined with the usual tools of HTML for creating navigation pattern UIs.
Built-in support for portal-specific transition animations. Given that portals are represented by HTML elements, existing CSS mechanisms are enough to allow authors to create compelling navigation transitions.
Subsume all the use cases of iframes. The use cases for portals overlap with those for iframes, but in exchange for the ability to be activated, portaled pages lose abilities like cross-origin communication, storage, and nontrivial interactivity. As such, portals are not suitable for use cases like embedded widgets.
Allowing arbitrary unmodified web pages to be portaled. Cross-origin pages will need to adapt to work well when they are hosted in a portal.
The general idea of portals is summed up above: prerendering-with-preview, activation, and predecessor adoption. Many further details are covered in the prerendering browsing contexts explainer; in particular, the restrictions on portaled content, the session history and navigation integration, and some of the baseline rendering-related behavior.
These subsections go into more detail on important parts of how portals work, with a focus on how portals extend the baseline prerendering browsing context concept.
An embedder which portals same-origin content has the ability to communicate with the portaled page via message passing, similar to how iframes work. This can be used for coordinating across the boundary to create especially-dynamic previews.
As shown in the introductory example, this is done by exposing the postMessage()
method directly on the HTMLPortalElement
interface. Unlike an iframe, there is no direct access to the contentWindow
of the portaled content; message passing is the only interface available.
Additionally, all pages get a window.portalHost
property, which is non-null for all portaled content. This is the way that portaled content receives or transmits messages from or to its embedder:
window.portalHost.addEventListener("message", e => { /* ... */ });
window.portalHost.postMessage(/* ... */);
Cross-origin portaled content cannot communicate with its embedder, as doing so would allow cross-site tracking. In those cases, no message
events will be sent to window.portalHost
, and window.portalHost.postMessage()
will not deliver any message.
Like iframes, portals can render their contents inline in another document. However, because the portaled content is rendered in a prerendering browsing context, many APIs will treat the rendered content as non-visible. See the prerendering browsing context explainer's section on this for more information. This "not rendered, but prerendered" mode might require adaptation on the part of authors, which is part of the reason that an opt-in is required for prerendering.
TODO: do we really want to treat portals the same as <link rel="prerender">
or similar? Unlike those cases, they can be visible.
Portals enable preloading, previewing, and seamless transitions to another web page. They are expected to often be partially or fully offscreen, scaled, faded, or otherwise styled in a way that makes them unnatural to interact with directly. Additionally, we expect many web pages to allow themselves to be loaded in a portal for the purposes of facilitating a seamless transition, but still wish to mitigate certain kinds of threat (e.g. some forms of clickjacking) from an embedder who may not be fully trusted.
Therefore the portal content cannot be focused and does not receive input events. Instead, the <portal>
element itself is focusable (similar to a button or link) and eligible to receive input events (such as clicks) in the host document. For instance, the host document may handle this click event to animate and activate the <portal>
element and navigate to the target document. If not handled, clicking will activate the <portal>
immediately.
TODO: are we still considering any special treatment for scrolling of portaled content? Scroll handoff??
From an accessibility perspective, portals behave like a single activatable element (similar to a button). As discussed in the section above, the contents of portals are not interactive and don't receive input events and focus. As a result, the embedded contents of a portal are not exposed as elements in the accessibility tree.
Portals come with accessibility defaults right out of the box. Their default ARIA role is "button"
, and they are therefore visible to screen-readers as a button by default. The portal element is also intended to be focusable and keyboard activatable in the same way as a button. TODO: or should it instead be a link? See #226.
Portals also compute a default label from their embedded contents (by either using the title of the embedded page or concatenating all the visible text in the portal's viewport if the page doesn't have a title). This label can be overridden by authors using the aria-label
attribute.
These defaults ensure that a portal can be accessed and described by assistive technology without any work from authors. Additionally, by default clicking on a portal activates it; this ensures that even if the page author designs a more complicated interaction mode (such as a swipe), assistive technology and keyboard users can still activate the portal.
Authors should use the hidden
HTML attribute, or display: none
, to hide portals that are meant to be hidden until activation time, e.g. portals that are only used for prerendering. (This will also hide them from the accessibility tree.)
Authors should respect the prefers-reduced-motion
media query by conditionally disabling any animations used before/during portal activation. For CSS animations and transitions, this can be easily accomplished by overriding all animation durations with a short unnoticeable duration value when the media query is set. Animations triggered with the Web Animations API would have to be explicitly disabled in script by authors when the media query is set.
At a base level, portals behave the same as other prerendering browsing contexts do with respect to session history and navigation. To summarize, content inside the portal has a trivial session history, and activation acts like a navigation of the host page, appending the portal's current session history entry to the host page's session history. This works to preserve user expectations for the back button. Note that this is very different from how iframes behave, and is one of the reasons it is better to think of portals as "inline-displayed popups" or "prerendered links" than as iframes. (Discussed further below.)
Because of the predecessor adoption feature, portals have some additional complexity, where they can cause the predecessor (i.e. the original host document) to move into a prerendering browsing context which is then hosted by the successor (i.e. the activated page). This means that a top-level browsing context can turn into a prerendering browsing context. This is a problem since a prerendering browsing context is restricted. In particular, for the cross-origin case, privacy and permission related restrictions may be infeasible to reimpose. So while adoption is appropriate for the same-origin case, we propose more limited forms of this for the cross-origin case. For example, freezing the context on adoption or only showing an image of the previous content.
Furthermore, there is a period of time between activation and adoption when it has not yet been determined if the predecessor will be adopted as a portal or unloaded. We refer to this as the orphaned portal state. The predecessor is subject to the restrictions on a portal context while in this state.
If the predecessor is not adopted, then it may enter back/forward cache (bfcache). If the predecessor can't be cached then it is unloaded.
In addition to enabling seamless transitions to portaled content, we also want to enable seamless transitions from previously portaled content, the successor, back to its predecessor. This is done by re-hosting the successor context in its original portal element, and can be thought of as a form of implicit adoption. When a live predecessor is navigated to (e.g. by the user pressing the back button), we restore the successor context to its portal element in the predecessor. We then fire a restore
event on the element so that the predecessor can respond (e.g. by reversing the animation before the original activation). The live predecessor may be taken from bfcache, or if the predecessor was adopted, taken from a portal in the successor. In the latter case, this involves an implicit activation of the portal in the successor. Also note that since this restoration involves turning a top-level browsing context back into a portal context, only limited forms of restoration are proposed for the cross-origin case, as described above for regular adoption.
If the predecessor page can't handle being restored, it may set the irreversible
field in the activation options as an escape hatch to ensure it's unloaded. This prevents adoption and causes the predecessor to be ineligible for bfcache. Furthermore, eligibility for bfcache is a requirement for being adoptable.
Since whether a portal element is hosting a context changes over time, the element itself can be thought of as having a lifecycle. This is exposed to the page via state
.
State | Meaning |
---|---|
empty | Nothing has ever been loaded in the portal, or the previous contents were discarded due to failed restoration, the user agent reclaiming resources, etc. |
live | The portal is hosting a browsing context. |
activated | The portal has activated. This host page is adopted or in bfcache. |
frozen | The portal is hosting a browsing context, but that context has been frozen. |
epitaph | The previous contents were discarded, but unlike the empty state, there is some visual representation of the previous content. |
The events fired on a portal element to notify of its lifecycle changes are as follows.
Event | Meaning |
---|---|
onactivate | The portal contents have been activated by something other than an explicit call to the activate method (e.g. default click, back navigation). |
onrestore | The previous contents were restored into this portal element. |
ondiscard | The portal contents have been discarded due to a need to reclaim resources or due to the inability to perform restoration. |
onfreeze/onresume | Indicates when the portal context has been frozen/resumed. |
There is one more event, window.onportaladopt
, needed to communicate to a page that it has become a portal when other forms (activate()
promise resolving or onactivation
of a predecessor portal) are not applicable.
Depending on the semantics of the page, the activation of a predecessor may be viewed as traversing session history. For example, if scrolling a preview portal into view activates the preview, then scrolling back up could be considered a back navigation. A page can specify how a portal activation should affect session history by setting the history
field in the activation options to one of push
(default), replace
, back
, or forward
.
Consider how the navigation transition example above may be extended to handle back button transitions.
// This event fires when the user performs a back-navigation that causes the
// browser to restore this page from bfcache (or from being an adopted portal)
// as the top level document. This portal element's previous content has been
// returned to it. The user now sees this page as it was before we called
// activate when we were showing the whole viewport preview with this portal.
// We now reverse the transition, back from 100vw/100vh to 10vw/10vh.
portal.addEventListener('restore', async () => {
// Reverse the animation from the whole viewport preview.
if (!matchMedia('(prefers-reduced-motion: reduce)').matches) {
await portal.animate([{ width: '10vw', height: '10vh' }], { duration: 300 }).finished;
portal.hidden = true;
}
});
// If the browser could not restore the portal's contents when the user performed
// a back-navigation (see above about limitations of restoration), then we need
// to stop showing the portal element, as it's now empty.
// Note that a portal element may be discarded for other reasons, such as memory
// pressure on the system, so it's a good idea to handle discards in general.
portal.addEventListener('discard', async () => {
// If we're showing the preview when it's discarded and the user still sees
// the previous content, then we can make discarding look nicer by animating
// the portal away. Otherwise, just hide it.
if (portal.state === 'epitaph' && !portal.hidden &&
!matchMedia('(prefers-reduced-motion: reduce)').matches) {
await portal.animate([{ width: '10vw', height: '10vh' }], { duration: 300 }).finished;
portal.hidden = true;
} else {
portal.hidden = true;
portal.style.width = '10vw';
portal.style.height = '10vh';
}
});
Now let's consider a more advanced example where a user goes back and forth between pages of a site. Suppose we have a page embedding a widget with a portal. When the user taps on it, it's activated so the user can interact with the widget. The widget page adopts the host page and displays it as a background to produce a lightbox style UI. Suppose the user then performs a back navigation followed by a forward navigation.
Host page:
function createWidget() {
let widgetContainer = document.getElementById('widgetContainer');
let portal = document.createElement('portal');
portal.src = 'widget-page.html';
widgetContainer.append(portal);
portal.addEventListener('load', () => {
widgetContainer.hidden = false;
});
portal.addEventListener('click', async (e) => {
e.preventDefault();
if (!matchMedia('(prefers-reduced-motion: reduce)').matches) {
await portal.animate(/* ... */).finished;
}
await portal.activate();
// We happen to know that the widget will adopt us, but if we needed to
// check, we can test for |portalHost|.
if (!window.portalHost)
return;
// The host is adopted now, so make any desired visual changes for being
// embedded.
document.body.classList.add('embedded');
});
portal.addEventListener('restore', async () => {
// The user pressed back, so undo any visual changes done to the host while
// it was adopted.
document.body.classList.remove('embedded');
if (!matchMedia('(prefers-reduced-motion: reduce)').matches) {
await portal.animate(/* ... */).finished;
}
});
portal.addEventListener('activate', () => {
// After the user returned from the widget page, they pressed forward. The
// widget page is implicitly activated again.
// Make any desired visual changes to the host page for being embedded.
document.body.classList.add('embedded');
});
}
Widget page:
// It may be that the user can access the widget by visiting directly. Check
// whether we're in a portal so we can show an appropriate view.
if (window.portalHost) {
// Show embedded view.
document.body.classList.add('embedded');
}
window.addEventListener('portalactivate', (e) => {
// Show full view.
document.body.classList.remove('embedded');
// Augment the full view by showing the host in the background.
document.body.classList.add('showPredecessor');
let predecessorContainer = document.getElementById('predecessorContainer');
let predecessor = e.adoptPredecessor();
// Note that the second time |portalactivate| is called (when the user presses
// forward), the predecessor will be the existing predecessor portal created
// the first time. We don't need to check for that here, since the following
// lines will essentially be no-ops in that case.
predecessorContainer.appendChild(predecessor);
predecessor.onactivate = () => {
// The user pressed back to return to the host page.
// Show embedded view.
document.body.classList.remove('showPredecessor');
document.body.classList.add('embedded');
};
});
With this, the user can keep pressing back and forward which has the effect of dismissing and re-showing the widget. Suppose we now want to have the ability to dismiss the widget by tapping on the background of the widget. This can be done as follows:
Widget page:
// Continuing with |predecessor| in |portalactivate|:
predecessor.onclick = async (e) => {
e.preventDefault();
// Tapping outside of the widget is like pressing the back button, so we
// specify that this activation traverses session history.
await predecessor.activate({history: 'back'});
// Show embedded view.
document.body.classList.remove('showPredecessor');
document.body.classList.add('embedded');
};
The basics of activation are explained in the intro examples: calling portalElement.activate()
causes the embedding window to navigate to the content which is already loaded into the portal. That is, it is a developer-controlled way of performing the general activation operation that all prerendering browsing contexts have. This section discusses some of the subtler details created by exposing this functionality to developers, instead of leaving it up to the browser as other prerendering browsing contexts do.
First, note that a portal element may be in a state where it is not displaying valid, activatable content (see above). This could happen for several reasons:
<portal src="https://github.com/WICG/portals/raw/main/data:text/html,hello"></portal>
. Portals, like all prerendering browsing contexts, can only display HTTP(S) URLs.data:
URL, or if the portaled content gives a network error.(What, exactly, the <portal>
element displays in this state is still under discussion: #251.)
Attempting to activate a portal in such a state will fail, causing the activate()
promise to reject.
Furthermore, user agents have existing limitations on navigations initiated by the page where they may be ignored if they are considered to conflict with a user's intent to perform a different navigation. Such cases are not described by the existing navigation spec (see #218), but portal activations are subject to these limitations. In the case where another navigation takes precedence over portal activation, the promise returned by activate()
will reject.
Activation promise rejections allow page authors to gracefully handle the inability to navigate. They could do this by simply falling back to the browser's default error experience, e.g. by doing location.href = portalEl.src
. Or they could display a custom error experience.
Another consideration is how activation behaves when the portal is currently loading content. This breaks down into a few cases:
During the initial load of content into a portal, e.g. given
const portal = document.createElement("portal");
portal.src = "https://slow.example.com/";
document.body.append(portal);
portal.activate();
the promise returned by activate()
will not settle until the navigation is far enough along to determine whether or not it will be successful. This requires waiting for the response to start arriving, to ensure there are no network errors and that the final response URL is a HTTP(S) URL. Once it reaches that point, then the promise will fulfill or reject appropriately. If the promise fulfills, then activation will have completed, and the content will be loading into the newly-activated browsing context. If it rejects, then no activation will have occurred.
After the initial load of the portal, via a host-initiated navigation. For example, given
const portal = getSomeExistingFullyLoadedPortal();
portal.src = "https://different-url.example.com/";
portal.activate();
the assignment to src="https://github.com/WICG/portals/raw/main/"
will immediately close the currently-displayed browsing context, and start loading the assigned URL in a new browsing context. So, this ends up behaving the same as the previous case: the promise returned by activate()
will not settle until the navigation is far enough along to determine success.
After the initial load of the portal, via a portaled-content–initiated navigation. For example, given
const portal = document.createElement("portal");
portal.src = "https://example.com/";
document.body.append(portal);
portal.onload = () => portal.activate();
where https://example.com/
itself contains
<script>
location.href = "https://slow.example.org";
</script>
we will immediately activate the portal's content, and the navigation to the new content will happen at top-level, not delaying activate()
. In these cases, the promise returned by activate()
will generally fulfill, as it is almost always possible to activate the already-loaded content. (The exceptions are edge cases like if another user-initiated navigation, or another portal activation, is already ongoing.)
Combined, these behaviors allow authors to write fairly simple code to activate and handle errors, as seen in the navigation transitions example.
CSP has various interactions with embedded content and navigations. Portaled content follows all the baseline rules for prerendering browsing contexts. The following section outlines some additional integrations.
The host page's CSP has the following mechanisms available to prevent content from being loaded into a portal, or being activated:
portal-src
, is introduced, which can be used to restrict what URLs can be loaded into <portal>
elements. If not supplied, its value will fall back to that of prefetch-src
.prefetch-src
will apply to portals, as they are a special case of prerendering browsing contexts.default-src
, which serves as a fallback for all fetch directives, will apply to portals.navigate-to
prevents portal activation, based on the <portal>
's src="https://github.com/WICG/portals/raw/main/"
URL (not based on the URL of its currently-loaded content).Note that portal-src
does not fall back to frame-src
or child-src
, despite portals being arguably somewhat-like frames/children. They are different enough that they need to be treated separately.
A natural worry about not falling back to frame-src
or similar is that portals might introduce new attack vectors to pages that set frame-src
with the intention of protecting themselves from injected embedded content. However, we believe this is not the case. Portaled content is limited enough in how it communicates with the host page that the only relevant attack CSP can prevent is exfiltration of data via the <portal>
's src="https://github.com/WICG/portals/raw/main/"
attribute. But if the page author is concerned about this sort of attack, then they also needs to prevent all resource loads in general, which means they will have set default-src
or prefetch-src
. And since portal-src
falls back to these values, this means the attack is prevented even under our proposed scheme.
Finally, we note that because portaled content must opt in to being portaled, portaled content is not subject to any of the existing opt-outs that other embedded content such as iframes use. For example, specifying the frame-ancestors
CSP directive, or its legacy counterpart in the X-Frame-Options
header, does not change whether the content is portaled. This allows pages to allow themselves to be portaled via the opt-in, while also using these existing mechanisms to prevent themselves from being framed.
Portals, unlike iframes, do not provide mechanisms for the embedder to impose policies or delegate permissions. Namely, there is no counterpart to the following <iframe>
attributes:
csp=""
, for triggering CSP Embedded Enforcementpolicy=""
, for triggering Document Policysandbox=""
, for triggering sandboxingallow=""
/allowfullscreen=""
, for triggering Permissions PolicyThis is a design choice based on the fact that portaling a page is more like linking to it than it is like embedding it, as discussed below.
In particular, after portal activation, it doesn't make sense for the host page to impose policies or delegate permissions. At that point the portaled content has become a full top-level browsing context, out of the original host's control. It might even navigate to a completely unrelated site, e.g. through the user clicking on an outgoing link.
So, any mechanism for supporting this kind of embedder control or delegation would need to switch off upon activation. But these features aren't designed to do that; they all are imposed for the entire lifetime of the browsing context. We could try to create variants of them that only lasted for a document's lifetime, instead of an entire browsing context's lifetime, but this would pile confusion on top of an already-complicated space.
An additional reason for avoiding these mechanisms is that it makes writing portalable content even harder. Not only would the content author have to deal with browser-imposed pre-activation restrictions—it would also have to deal with embedder-specific restrictions, which could vary from embedder to embedder. Since, unlike iframes, portaled content generally wants to be portaled by many different embedders (e.g. different content aggregators all using portals for prerendering), this kind of ecosystem fragmentation is undesirable.
To conclude, instead of giving embedders this control as iframes do, we believe that the browser can take the role of mitigating any problematic features. For example, instead of requiring embedders to use sandbox=""
to turn off modal alert()
/confirm()
/prompt()
dialogs, or permissions policy to turn off autoplaying media, those features are always disabled in pre-activation portals. And because portals are isolated from communicating with their embedder pre-activation, any problems which CSP Embedded Enforcement would attempt to protect against will instead be caught by this communications barrier and prevented from impacting the embedder.
Portals are somewhat reminiscent of iframes, but are different in enough significant ways that we propose them as a new element.
From a user's perspective, a portal behaves more like a "super link" than an iframe. That is, it has the same interactivity and accessibility model of being a single activatable element, which will cause a navigation of the page they're currently viewing. It'll be fancier than a link, in that the portal might display a preview of the portaled content, and the navigation experience will be quicker (and potentially animated, if the site author so chooses). But the ways in which it is fancier will generally not remind users of iframes, i.e. of scrollable viewports into an independently-interactive piece of content hosted on another page.
From the perspective of implementers and specification authors, portals behave something like "popups that display inline". This is because prerendering browsing contexts are top-level browsing contexts, and not nested browsing contexts. More specifically, prerendering browsing contexts sit alongside auxiliary browsing contexts (popups) as two distinct types of top-level browsing context, and much of the specification infrastructure is shared. This becomes even more true after activation, when the portal browsing context becomes just another tab (and ceasing being a prerendering browsing context).
Finally, the web developer dealing with a portal element's API sees the following differences from iframes:
Portaled content needs to opt-in to being portaled. Iframed content can only opt-out from being iframed (via X-Frame-Options
or CSP's frame-ancestors
).
Even same-origin portals do not provide synchronous DOM access to the portaled Window
or Document
objects, whereas iframes give such access via frame.contentWindow
/frame.contentDocument
. This gives a more uniform isolation boundary for more predictable performance and security.
Similarly, portaled Window
objects are not accessible via accessors like window.iframeName
or window[0]
, and they cannot access related Window
objects via top
or parent
(or opener
).
Navigations and history APIs within a pre-activation portal do not affect session history (see above). In contrast, navigating an iframe creates a new session history entry, and affects the resulting back button behavior.
Portals cannot be made to navigate from the outside in the way iframes (or popups) can, via window.open(url, iframeName)
.
Portals can only load http:
and https:
URLs. This removes an entire category of confusing interactions regarding about:blank
, javascript:
, blob:
, and data:
URLs, as well as the <iframe srcdoc="">
feature and its resulting about:srcdoc
URLs. Notably, the portaled content will always have an origin derived from its URL, without any inheritance from the host document.
Pre-activation, portals are restricted from using a variety of features, like any API that requires a permission or user gesture, or modal dialogs, or downloads. There is no equivalent of <iframe>
's allow=""
attribute which lets portaled pages act on behalf of their host.
Pre-activation, cross-origin portals do not have access to storage or other communication channels. In exchange, they get full access to unpartitioned first-party storage after activation. (In contrast, iframes are moving toward having access to partitioned storage throughout their lifetime.)
Portals, like links but unlike iframes, cannot have policies imposed on them by the embedding page.
TODO: summarize the differences related to rendering, once those are more fleshed out.
It would be possible to design portals as an extension of an existing element. As discussed in the summary of differences between portals and iframes, potential candidates would be <iframe>
or <a>
. So you could imagine something like
<a href="https://example.com/portal-me" portal>Some text</a>
or
<iframe src="https://example.com/portal-me" portal></iframe>
However, in both cases the new attribute would change the behavior of the element in ways that are problematic from the perspective of users, web developers, implementers, and specification writers.
For users, the biggest confusion would be the experience in browsers that do not support portals. Falling back to a link might work reasonably well, as long as the web developer specifically codes around the lack of activation behavior. Falling back to an iframe is likely to work poorly; portaled content operates under a very different security and privacy model than iframed content, and the resulting page would likely be broken.
Additionally, the behavioral differences outlined above would lead to extensive forks in the specification for these elements, to go down a new "portal path" whenever the attribute was present. This creates a maintenance burden for specification writers and implementers, and a confusing experience for web developers. The closest precedent we have for a single attribute causing such a dramatic change to behavior is <input>
's type=""
attribute, which has been a painful experience. We would also have to define behavior for when the attribute is added or removed, including when such additions or removals happen during delicate phases of the element's lifecycle like parsing, navigation, interaction, or portal activation.
Finally, we believe that attempting to classify a portal as a "type of iframe" or "type of link" is pedagogically harmful. Although there is some overlap in use cases, a portal is a different piece of technology, and as such is best represented as its own element. It can thus generate its own documentation, developer guidance, and ecosystem discussion. This includes guidance both on how to use portals, as separate from iframes and links, and on how best to let your content be portaled, separately from letting it be framed or linked to.
See also the W3C TAG Security and Privacy Questionnaire answers.
The main privacy concern with portals, as with all embedded content, is cross-site tracking. The threat model here is outlined in great detail elsewhere, as are the mitigations that portals apply to prevent such tracking. The summary is that portals are much better in this regard than iframes, and instead are designed to have the same privacy properties as links. That is, cross-site tracking is possible using link decoration on the <portal>
's src="https://github.com/WICG/portals/raw/main/"
attribute, similar to the <a>
element's href="https://github.com/WICG/portals/blob/main/"
, but this tracking will only be possible once the portal activates/link navigates, which causes a very-user-visible full-page transition to the portaled/linked site.
On the security side, portals are a new element which can emit requests and run script. Although much of the potential damage that a portal could cause is mitigated by the privacy protections—e.g., unlike the <iframe>
or <script>
elements, there is no direct access to the host document—it is still important to provide control over portals through the usual mechanisms. This is where our CSP integration comes in.
Finally, any embedded content naturally gives rise to concerns about clickjacking. For portals, this is not a concern: user interaction does not pass through to the portaled document.
Thank you to Andrew Betts for his promotable iframe proposal, which inspired much of the thinking here.
Contributions and insights from: Adithya Srinivasan, David Bokan, Domenic Denicola, Ian Clelland, Jake Archibald, Jeffrey Jasskin, Jeremy Roman, Kenji Baheux, Kevin McNee, Lucas Gadani, Ojan Vafai, Rick Byers, and Yehuda Katz.