You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[Relying on existing performance measurement APIs](#relying-on-existing-performance-measurement-apis)
@@ -80,14 +81,14 @@ When the policy is active, the User Agent monitors network resource requests ini
80
81
81
82
Specifically, the User Agent flags the following conditions as policy violations:
82
83
83
-
1.**Text-based resources served without HTTP compression**
84
+
1.**Text-based resources served without HTTP compression.**
84
85
Text‑based resources such as HTML, CSS, JavaScript, and JSON are expected to be delivered using HTTP‑based compression.
85
86
86
-
2.**Uncompressed file formats when compressed alternatives are available**
87
+
2.**Uncompressed file formats when compressed alternatives are available.**
87
88
Non‑text resources are expected to use compressed formats when such formats are supported and available. For example, using `.ttf` fonts instead of `.woff`.
88
89
89
-
3.**Resources with excesive total size**
90
-
To limit disproportionate network cost, size thresholds apply to following resources and non‑network resource embeddings:
90
+
3.**Resources with excesive total size.**
91
+
To limit disproportionate network cost, size thresholds apply to the following resources and non‑network resource embeddings:
91
92
92
93
* data: URLs larger than 100 kB
93
94
* Image files larger than 200 kB
@@ -150,6 +151,19 @@ When enforcement is enabled for `network-efficiency-guardrails`, resource reques
150
151
151
152
Enforcement builds on the same violation detection and reporting model described above. For this reason, it is expected that sites would deploy the policy in reporting‑only mode first, using the resulting reports to evaluate impact before enabling enforcement.
152
153
154
+
### Open questions
155
+
156
+
As the proposal evolves through incubation, there are several related areas that may warrant further discussion and refinement.
157
+
158
+
**Compression eligibility for additional resource types**
159
+
The current criteria distinguish between text‑based resources, which are required to be served with HTTP compression, and non‑text resources, which are subject to size‑based limits but are not required to be compressed. Some binary formats, such as WebAssembly modules, are commonly served in compressed form and can incur significant network cost when uncompressed.
160
+
161
+
Whether additional compressible binary resource types should be subject to compression requirements, size‑based limits, or a combination of both is an open question for further discussion. Because the policy may block resources when enforcement is enabled, any such criteria would need to be defined explicitly: either as part of the existing policy configuration, under a separate configuration point, or through [parameters on Document Policy](https://wicg.github.io/document-policy/#issue-91264ad1).
162
+
163
+
164
+
**Handling of very small text resources**
165
+
For sufficiently small payloads, the overhead of applying HTTP compression may outweigh its benefits, depending on the compression algorithm and transport. Allowing exceptions or lower bounds for compression requirements on very small resources is a potential refinement. However, introducing such exceptions raises questions around threshold selection, which would need to be considered during incubation. For example, whether a single common threshold should apply across compression algorithms, or whether algorithm‑specific thresholds would be appropriate.
While we believe the proposed policy is useful and complete as defined in this document, enabling controlled reporting across document boundaries would further amplify the value of this signal in embedded scenarios. In many real‑world cases, inefficient resource usage originates in a nested document, while the resulting performance impact is primarily experienced by the embedding document. Allowing embedders to receive policy violation information would enable more effective diagnosis and remediation of such issues.
@@ -235,3 +249,4 @@ And to the contributors and reviewers who helped shape the `network-efficiency-g
0 commit comments