Copyright © 2023 World Wide Web Consortium . W3C ® liability , trademark and permissive document license rules apply.
The Push API enables sending of a push message to a web application via a push service . An application server can send a push message at any time, even when a web application or user agent is inactive. The push service ensures reliable and efficient delivery to the user agent . Push messages are delivered to a Service Worker that runs in the origin of the web application, which can use the information in the message to update local state or display a notification to the user.
This specification is designed for use with the web push protocol , which describes how an application server or user agent interacts with a push service .
This section describes the status of this document at the time of its publication. A list of current W3C publications and the latest revision of this technical report can be found in the W3C technical reports index at https://www.w3.org/TR/.
This document was published by the Web Applications Working Group as an Editor's Draft.
Publication as an Editor's Draft does not imply endorsement by W3C and its Members.
This is a draft document and may be updated, replaced or obsoleted by other documents at any time. It is inappropriate to cite this document as other than work in progress.
This document was produced by a group operating under the W3C Patent Policy . W3C maintains a public list of any patent disclosures made in connection with the deliverables of the group; that page also includes instructions for disclosing a patent. An individual who has actual knowledge of a patent which the individual believes contains Essential Claim(s) must disclose the information in accordance with section 6 of the W3C Patent Policy .
This document is governed by the 03 November 2023 W3C Process Document .
This section is non-normative.
The Push API allows a web application to communicate with a user agent asynchronously. This allows an application server to provide the user agent with time-sensitive information whenever that information becomes known, rather than waiting for a user to open the web application.
As defined here, push services support delivery of push messages at any time.
In particular, a push message will be delivered to the web application even if that web application is not currently active in a browser window: this relates to use cases in which the user may close the web application, but still benefits from the web application being able to be restarted when a push message is received. For example, a push message might be used to inform the user of an incoming WebRTC call.
A push message can also be sent when the user agent is temporarily offline. In support of this, the push service stores messages for the user agent until the user agent becomes available. This supports use cases where a web application learns of changes that occur while a user is offline and ensures that the user agent can be provided with relevant information in a timely fashion. Push messages are stored by the push service until the user agent becomes reachable and the message can be delivered.
The Push API will also ensure reliable delivery of push messages while a user agent is actively using a web application, for instance if a user is actively using the web application or the web application is in active communication with an application server through an active worker, frame, or background window. This is not the primary use case for the Push API. A web application might choose to use the Push API for infrequent messages to avoid having to maintain constant communications with the application server .
Push messaging is best suited to occasions where there is not already an active communications channel established between user agent and web application. Sending push messages requires considerably more resources when compared with more direct methods of communication such as the Fetch API or Web Sockets . Push messages usually have higher latency than direct communications and they can also be subject to restrictions on use. Most push services limit the size and quantity of push messages that can be sent.
The web push protocol [ RFC8030 ] describes a protocol that enables communication between a user agent or application server and a push service . Alternative protocols could be used in place of this protocol, but this specification assumes the use of this protocol; alternative protocols are expected to provide compatible semantics.
The
Content-Encoding
HTTP
header,
described
in
Section
3.1.2.2
of
[
RFC7231
],
indicates
the
content
coding
applied
to
the
payload
of
a
push
message
.
The term application server refers to server-side components of a web application.
A push message is data sent to a web application from an application server .
A push message is delivered to the active worker associated with the push subscription to which the message was submitted. If the service worker is not currently running, the worker is started to enable delivery.
A push subscription is a message delivery context established between the user agent and the push service on behalf of a web application. Each push subscription is associated with a service worker registration and a service worker registration has at most one push subscription .
A push subscription has an associated push endpoint . It MUST be the absolute URL exposed by the push service where the application server can send push messages to. A push endpoint MUST uniquely identify the push subscription .
A push subscription MAY have an associated subscription expiration time . When set, it MUST be the time, in milliseconds since 00:00:00 UTC on 1 January 1970, at which the subscription will be deactivated . The user agent SHOULD attempt to refresh the push subscription before the subscription expires.
A push subscription has internal slots for a P-256 ECDH key pair and an authentication secret in accordance with [ RFC8291 ]. These slots MUST be populated when creating the push subscription .
If
the
user
agent
has
to
change
the
keys
for
any
reason,
it
MUST
fire
the
"
pushsubscriptionchange
"
event
with
the
service
worker
registration
associated
with
the
push
subscription
as
registration
,
a
PushSubscription
instance
representing
the
push
subscription
having
the
old
keys
as
oldSubscription
and
a
PushSubscription
instance
representing
the
push
subscription
having
the
new
keys
as
newSubscription
.
To
create
a
push
subscription
,
given
an
PushSubscriptionOptionsInit
optionsDictionary
:
PushSubscription
.
PushSubscriptionOptions
object,
initializing
its
attributes
with
the
corresponding
members
and
values
of
optionsDictionary
.
options
attribute
to
options
.
getKey
()
method
of
the
PushSubscription
with
an
argument
of
"
p256dh
".
getKey
()
method
of
the
PushSubscription
with
an
argument
of
"
auth
".
applicationServerKey
attribute
of
options
when
it
has
been
set.
Rethrow
any
exceptions
.
endpoint
attribute
to
the
URL
provided
by
the
push
subscription
.
expirationTime
.
A user agent or push service MAY choose to refresh a push subscription at any time, for example because it has reached a certain age.
When
this
happens,
the
user
agent
MUST
run
the
steps
to
create
a
push
subscription
given
the
PushSubscriptionOptions
that
were
provided
for
creating
the
current
push
subscription
.
The
new
push
subscription
MUST
have
a
key
pair
that's
different
from
the
original
subscription.
When
successful,
user
agent
then
MUST
fire
the
"
pushsubscriptionchange
"
event
with
the
service
worker
registration
associated
with
the
push
subscription
as
registration
,
a
PushSubscription
instance
representing
the
initial
push
subscription
as
oldSubscription
and
a
PushSubscription
instance
representing
the
new
push
subscription
as
newSubscription
.
To allow for time to propagate changes to application servers , a user agent MAY continue to accept messages for an old push subscription for a brief time after a refresh. Once messages have been received for a refreshed push subscription , any old push subscriptions MUST be deactivated .
If
the
user
agent
is
not
able
to
refresh
the
push
subscription
,
it
SHOULD
periodically
retry
the
refresh.
When
the
push
subscription
can
no
longer
be
used,
for
example
because
it
has
expired,
the
user
agent
MUST
fire
the
"
pushsubscriptionchange
"
event
with
the
service
worker
registration
associated
with
the
push
subscription
as
registration
,
a
PushSubscription
instance
representing
the
deactivating
push
subscription
as
oldSubscription
and
null
as
the
newSubscription
.
When a push subscription is deactivated , both the user agent and the push service MUST delete any stored copies of its details. Subsequent push messages for this push subscription MUST NOT be delivered.
A push subscription is deactivated when its associated service worker registration is unregistered, though a push subscription MAY be deactivated earlier.
A push subscription is removed when service worker registration is cleared.
The term push service refers to a system that allows application servers to send push messages to a web application. A push service serves the push endpoint or endpoints for the push subscriptions it serves.
The user agent connects to the push service used to create push subscriptions . User agents MAY limit the choice of push services available. Reasons for doing so include performance-related concerns such as service availability (including whether services are blocked by firewalls in specific countries, or networks at workplaces and the like), reliability, impact on battery lifetime, and agreements to steer metadata to, or away from, specific push services .
The Push API is a powerful feature identified by the name "push" .
For
integration
with
the
Permissions
specification,
this
specification
defines
the
PushPermissionDescriptor
permission
descriptor
type
.
WebIDLdictionary PushPermissionDescriptor
: PermissionDescriptor {
boolean userVisibleOnly
= false;
};
The
userVisibleOnly
has
the
same
semantics
as
userVisibleOnly
.
{name:
"push",
userVisibleOnly:
false}
is
stronger
than
{name:
"push",
userVisibleOnly:
true}
.
The contents of a push message are encrypted [ RFC8291 ]. However, the push service is still exposed to the metadata of messages sent by an application server to a user agent over a push subscription . This includes the timing, frequency and size of messages. Other than changing push services , which user agents may disallow, the only known mitigation is to increase the apparent message size by padding.
There is no guarantee that a push message was sent by an application server having the same origin as the web application. The application server is able to share the details necessary to use a push subscription with a third party at its own discretion.
The following requirements are intended to protect the privacy and security of the user as far as possible, and subject to meeting that goal, to protect the integrity of the application server 's communication with the user.
User
agents
MUST
NOT
provide
Push
API
access
to
web
applications
without
the
express
permission
of
the
user.
User
agents
MUST
acquire
consent
for
permission
through
a
user
interface
for
each
call
to
the
subscribe()
method,
unless
a
previous
permission
grant
has
been
persisted,
or
a
prearranged
trust
relationship
applies.
Permissions
that
are
preserved
beyond
the
current
browsing
session
MUST
be
revocable.
The Push API may have to wake up the Service Worker associated with the service worker registration in order to run the developer-provided event handlers. This can cause resource usage, such as network traffic, that the user agent SHOULD attribute to the web application that created the push subscription .
The
user
agent
MAY
consider
the
PushSubscriptionOptions
when
acquiring
permission
or
determining
the
permission
status.
When
a
permission
is
revoked,
the
user
agent
MAY
fire
the
"
pushsubscriptionchange
"
event
for
subscriptions
created
with
that
permission,
with
the
service
worker
registration
associated
with
the
push
subscription
as
registration
,
a
PushSubscription
instance
representing
the
push
subscription
as
oldSubscription
,
and
null
as
newSubscription
.
The
user
agent
MUST
deactivate
the
affected
subscriptions
in
parallel.
When a service worker registration is unregistered, any associated push subscription MUST be deactivated .
The push endpoint MUST NOT expose information about the user to be derived by actors other than the push service , such as the user's device, identity or location. See the Privacy Considerations in [ RFC8030 ] for the exact requirements.
The push endpoint of a deactivated push subscription MUST NOT be reused for a new push subscription . This prevents the creation of a persistent identifier that the user cannot remove. This also prevents reuse of the details of one push subscription to send push messages to another push subscription .
User agents MUST implement the Push API to only be available in a secure context . This provides better protection for the user against man-in-the-middle attacks intended to obtain push subscription data. Browsers may ignore this rule for development purposes only.
This section is non-normative.
A push message is sent from an application server to a web application as follows:
This overall framework allows application servers to activate a Service Worker in response to events at the application server . Information about those events can be included in the push message , which allows the web application to react appropriately to those events, potentially without needing to initiate network requests.
The following code and diagram illustrate a hypothetical use of the push API.
This section is non-normative.
// https://example.com/serviceworker.js
this.onpush = event => {
console.log(event.data);
// From here we can write the data to IndexedDB, send it to any open
// windows, display a notification, etc.
}
// https://example.com/webapp.js
// inside an async function...
try {
const serviceWorkerRegistration = await navigator.serviceWorker.register(
"serviceworker.js"
);
const pushSubscription = await serviceWorkerRegistration.pushManager.subscribe();
// The push subscription details needed by the application
// server are now available, and can be sent to it using,
// for example, an XMLHttpRequest.
console.log(pushSubscription.endpoint);
console.log(pushSubscription.getKey("p256dh"));
console.log(pushSubscription.getKey("auth"));
} catch (err) {
// In a production environment it might make sense to
// also report information about errors back to the
// application server.
console.log(error);
}
This section is non-normative.
The
fields
included
in
the
PushSubscription
is
all
the
information
needed
for
an
application
server
to
send
a
push
message
.
Push
services
that
are
compatible
with
the
Push
API
provide
a
push
endpoint
that
conforms
to
the
web
push
protocol
.
These
parameters
and
attributes
include:
PushSubscription
is
a
URL
that
allows
an
application
server
to
request
delivery
of
a
push
message
to
a
web
application.
getKey
()
method
on
a
PushSubscription
is
used
to
retrieve
keying
material
used
to
encrypt
and
authenticate
push
messages
.
Each
invocation
of
the
function
returns
a
new
ArrayBuffer
that
contains
the
value
of
the
corresponding
key,
or
null
if
the
identified
key
doesn't
exist.
Passing
a
value
of
"
p256dh
"
retrieves
a
elliptic
curve
Diffie-Hellman
(
ECDH
)
public
key
associated
with
the
push
subscription
.
Passing
a
value
of
auth
returns
an
authentication
secret
that
an
application
server
uses
in
authentication
of
its
messages.
These
keys
are
used
by
the
application
server
to
encrypt
and
authenticate
messages
for
the
push
subscription
,
as
described
in
[
RFC8291
].
The
Service
Worker
specification
defines
a
ServiceWorkerRegistration
interface
[
SERVICE-WORKERS
],
which
this
specification
extends.
WebIDL[SecureContext]
partial interface ServiceWorkerRegistration {
readonly attribute PushManager
pushManager
;
};
The
pushManager
attribute
exposes
a
PushManager
,
which
has
an
associated
service
worker
registration
represented
by
the
ServiceWorkerRegistration
on
which
the
attribute
is
exposed.
The
PushManager
interface
defines
the
operations
to
access
push
services
.
WebIDL[Exposed=(Window,Worker), SecureContext]
interface PushManager
{
[SameObject] static readonly attribute FrozenArray<DOMString> supportedContentEncodings
;
Promise<PushSubscription
> subscribe
(optional PushSubscriptionOptionsInit
options = {});
Promise<PushSubscription
?> getSubscription
();
Promise<PermissionState> permissionState
(optional PushSubscriptionOptionsInit
options = {});
};
The
supportedContentEncodings
attribute
exposes
the
sequence
of
supported
content
codings
that
can
be
used
to
encrypt
the
payload
of
a
push
message
.
A
content
coding
is
indicated
using
the
Content-Encoding
header
field
when
requesting
the
sending
of
a
push
message
from
the
push
service
.
User
agents
MUST
support
the
aes128gcm
content
coding
defined
in
[
RFC8291
],
and
MAY
support
content
codings
defined
in
previous
versions
of
the
draft
for
compatibility
reasons.
The
subscribe()
method
when
invoked
MUST
run
the
following
steps:
Window
object:
NotAllowedError
"
DOMException
.
userVisibleOnly
value
set
to
false
and
the
user
agent
requires
it
to
be
true
,
queue
a
global
task
on
the
networking
task
source
using
global
to
reject
promise
"
NotAllowedError
"
DOMException
applicationServerKey
member,
and
the
push
service
requires
one
to
be
given,
queue
a
global
task
on
the
networking
task
source
using
global
to
reject
promise
with
a
"
NotSupportedError
"
DOMException
.
applicationServerKey
attribute,
run
the
following
sub-steps:
applicationServerKey
is
a
DOMString
,
set
its
value
to
an
ArrayBuffer
containing
the
sequence
of
octets
that
result
from
decoding
options
's
applicationServerKey
using
the
base64url
encoding
[
RFC7515
].
InvalidCharacterError
"
DOMException
and
terminate
these
steps.
applicationServerKey
describes
a
valid
point
on
the
P-256
curve.
If
its
value
is
invalid,
queue
a
global
task
on
the
networking
task
source
using
global
to
reject
promise
with
an
"
InvalidAccessError
"
DOMException
and
terminate
these
steps.
InvalidStateError
"
DOMException
and
terminate
these
steps.
denied
",
queue
a
global
task
on
the
user
interaction
task
source
using
global
to
reject
promise
with
a
"
NotAllowedError
"
DOMException
and
terminate
these
steps.
AbortError
"
DOMException
and
terminate
these
steps.
options
attribute
of
subscription
.
The
contents
of
BufferSource
values
are
compared
for
equality
rather
than
reference
.
InvalidStateError
"
DOMException
and
terminate
these
steps.
PushSubscription
providing
the
details
of
the
new
subscription
.
The
getSubscription
method
when
invoked
MUST
run
the
following
steps:
DOMException
whose
name
is
"
AbortError
"
and
terminate
these
steps.
PushSubscription
providing
the
details
of
the
retrieved
push
subscription
.
The
permissionState()
method
when
invoked
MUST
run
the
following
steps:
PermissionDescriptor
with
the
name
}
initialized
to
"push".
Permission to use the push service can be persistent, that is, it does not need to be reconfirmed for subsequent subscriptions if a valid permission exists.
If
there
is
a
need
to
ask
for
permission,
it
needs
to
be
done
by
invoking
the
subscribe
()
method.
WebIDL[Exposed=(Window,Worker), SecureContext]
interface PushSubscriptionOptions
{
readonly attribute boolean userVisibleOnly
;
[SameObject] readonly attribute ArrayBuffer? applicationServerKey
;
};
The
userVisibleOnly
attribute,
when
getting,
returns
the
value
it
was
initialized
with.
The
applicationServerKey
attribute,
when
getting,
returns
the
value
it
was
initialized
with.
If
present,
the
value
of
applicationServerKey
MUST
include
a
point
on
the
P-256
elliptic
curve
[
DSS
],
encoded
in
the
uncompressed
form
described
in
[
ANSI-X9-62
]
Annex
A
(that
is,
65
octets,
starting
with
an
0x04
octet).
When
provided
as
a
DOMString
,
the
value
MUST
be
encoded
using
the
base64url
encoding
[
RFC7515
].
User
agents
MAY
reject
a
subscription
attempt
when
applicationServerKey
is
not
present
and
the
push
service
requires
one
for
operational
reasons.
The
applicationServerKey
MUST
be
a
different
value
to
the
one
used
for
message
encryption
[
RFC8291
].
WebIDLdictionary PushSubscriptionOptionsInit
{
boolean userVisibleOnly
= false;
(BufferSource or DOMString)? applicationServerKey
= null;
};
The
userVisibleOnly
member,
when
set
to
true
,
indicates
that
the
push
subscription
will
only
be
used
for
push
messages
whose
effect
is
made
visible
to
the
user,
for
example
by
displaying
a
Web
Notification.
[
NOTIFICATIONS
]
A
PushSubscriptionOptionsInit
represents
additional
options
associated
with
a
push
subscription
.
The
user
agent
MAY
consider
these
options
when
requesting
express
permission
from
the
user.
When
an
option
is
considered,
the
user
agent
SHOULD
enforce
it
on
incoming
push
messages
.
These options are optional, and user agents MAY choose to support only a subset of them. A user agent MUST NOT expose options that it does not support.
Once
set,
options
for
a
push
subscription
cannot
change.
A
pre-existing
push
subscription
can
be
unsubscribed,
via
unsubscribe
,
to
create
a
push
subscription
with
new
options.
The
applicationServerKey
member
is
used
by
the
user
agent
when
establishing
a
push
subscription
with
a
push
service
.
The
applicationServerKey
option
includes
an
elliptic
curve
public
key
for
an
application
server
.
This
is
the
key
that
the
application
server
will
use
to
authenticate
itself
when
sending
push
messages
to
this
push
subscription
as
defined
in
[
RFC8292
];
the
push
service
will
reject
any
push
message
unless
the
corresponding
private
key
is
used
to
generate
an
authentication
token.
A
PushSubscription
object
represents
a
push
subscription
.
WebIDL[Exposed=(Window,Worker), SecureContext]
interface PushSubscription
{
readonly attribute USVString endpoint
;
readonly attribute EpochTimeStamp? expirationTime
;
[SameObject] readonly attribute PushSubscriptionOptions
options
;
ArrayBuffer? getKey
(PushEncryptionKeyName
name);
Promise<boolean> unsubscribe
();
PushSubscriptionJSON
toJSON
();
};
dictionary PushSubscriptionJSON
{
USVString endpoint
;
EpochTimeStamp? expirationTime
= null;
record<DOMString, USVString> keys
;
};
When
getting
the
endpoint
attribute
,
the
user
agent
MUST
return
the
push
endpoint
associated
with
the
push
subscription
.
The
user
agent
MUST
use
a
serialization
method
that
does
not
contain
input-dependent
branches
(that
is,
one
that
is
constant
time).
When
getting
the
expirationTime
attribute
,
the
user
agent
MUST
return
the
subscription
expiration
time
associated
with
the
push
subscription
if
there
is
one,
or
null
otherwise.
When
getting
the
options
attribute,
the
user
agent
MUST
return
a
PushSubscriptionOptions
object
representing
the
options
associated
with
the
push
subscription
.
The
getKey()
method
retrieves
keying
material
that
can
be
used
for
encrypting
and
authenticating
messages.
When
getKey
()
is
invoked
the
following
process
is
followed:
name
argument.
null
.
ArrayBuffer
instance.
p256dh
"
public
key
is
encoded
using
the
uncompressed
format
defined
in
[
ANSI-X9-62
]
Annex
A
(that
is,
a
65
octet
sequence
that
starts
with
a
0x04
octet).
auth
parameter
contains
an
octet
sequence
used
by
the
user
agent
to
authenticate
messages
sent
by
an
application
server
.
Keys
named
"
p256dh
"
and
"
auth
"
MUST
be
supported,
and
their
values
MUST
correspond
to
those
necessary
for
the
user
agent
to
decrypt
received
push
messages
in
accordance
with
[
RFC8291
].
The
unsubscribe()
method
when
invoked
MUST
run
the
following
steps:
false
and
terminate
these
steps.
If the user agent failed to request the push service to deactivate the push subscription , for example because of network failures, it SHOULD retry the request to the push service for a reasonable amount of time.
true
.
The
toJSON()
method
when
invoked
MUST
run
the
following
steps:
PushSubscriptionJSON
dictionary.
endpoint
attribute
of
this
.
expirationTime
attribute
of
this
.
record
.
PushSubscription
,
ordered
by
the
name
of
the
key:
getKey
()
).
getKey
.
USVString
.
The
user
agent
MUST
use
a
serialization
method
that
does
not
branch
based
on
the
value
of
b
.
A
PushSubscriptionJSON
dictionary
represents
the
JSON
type
of
a
PushSubscription
.
In
ECMAScript
this
can
be
converted
into
a
JSON
string
through
the
JSON
.
stringify
()
function.
The
keys
record
contains
an
entry
for
each
of
the
supported
PushEncryptionKeyName
entries
to
the
URL-safe
base64
encoded
representation
[
RFC4648
]
of
its
value.
Note
that
the
options
to
a
PushSubscription
are
not
serialized.
Encryption
keys
used
for
push
message
encryption
are
provided
to
a
web
application
through
the
getKey
()
method
or
the
serializer
of
PushSubscription
.
Each
key
is
named
using
a
value
from
the
PushEncryptionKeyName
enumeration.
WebIDLenum PushEncryptionKeyName
{
"p256dh
",
"auth
"
};
The
p256dh
value
is
used
to
retrieve
the
P-256
ECDH
Diffie-Hellman
public
key
described
in
[
RFC8291
].
The
auth
value
is
used
to
retrieve
the
authentication
secret
described
in
[
RFC8291
].
WebIDL[Exposed=ServiceWorker, SecureContext]
interface PushMessageData
{
ArrayBuffer arrayBuffer
();
Blob blob
();
any json
();
USVString text
();
};
PushMessageData
objects
have
an
associated
byte
sequence
set
on
creation,
which
is
null
if
there
was
no
data
in
the
push
message
.
The
arrayBuffer()
method,
when
invoked,
MUST
return
an
ArrayBuffer
whose
contents
are
bytes
.
Exceptions
thrown
during
the
creation
of
the
ArrayBuffer
object
are
re-thrown.
The
blob()
method,
when
invoked,
MUST
return
a
Blob
whose
contents
are
bytes
and
type
is
not
provided.
The
json()
method,
when
invoked,
MUST
return
the
result
of
invoking
the
initial
value
of
JSON
.
parse
()
with
the
result
of
running
utf-8
decode
on
bytes
as
argument.
Re-throw
any
exceptions
thrown
by
JSON
.
parse
()
.
The
text
method,
when
invoked,
MUST
return
the
result
of
running
utf-8
decode
on
bytes
.
To extract a byte sequence from object , run these steps:
BufferSource
USVString
The
Service
Worker
specification
defines
a
ServiceWorkerGlobalScope
interface
[
SERVICE-WORKERS
],
which
this
specification
extends.
WebIDL[Exposed=ServiceWorker, SecureContext]
partial interface ServiceWorkerGlobalScope {
attribute EventHandler onpush
;
attribute EventHandler onpushsubscriptionchange
;
};
The
onpush
attribute
is
an
event
handler
IDL
attribute
whose
corresponding
event
handler
event
type
is
"
push
".
The
"
push
"
event
indicates
that
a
push
message
has
been
received
for
a
push
subscription
.
The
onpushsubscriptionchange
attribute
is
an
event
handler
IDL
attribute
whose
corresponding
event
handler
event
type
is
"
pushsubscriptionchange
".
WebIDL[Exposed=ServiceWorker, SecureContext]
interface PushEvent
: ExtendableEvent {
constructor
(DOMString type, optional PushEventInit
eventInitDict = {});
readonly attribute PushMessageData
? data
;
};
When
a
constructor
of
the
PushEvent
interface,
or
of
an
interface
that
inherits
from
the
PushEvent
interface,
is
invoked,
the
usual
event
constructing
steps
are
extended
to
include
the
following
steps:
data
member
is
not
present,
set
the
data
attribute
of
the
event
to
null
and
terminate
these
steps.
data
"
member
of
eventInitDict
.
data
attribute
of
the
event
to
a
new
PushMessageData
instance
with
bytes
set
to
b
.
The
data
,
when
getting,
returns
the
value
it
was
initialized
with.
WebIDLtypedef (BufferSource or USVString) PushMessageDataInit
;
dictionary PushEventInit
: ExtendableEventInit {
PushMessageDataInit
data
;
};
The
data
member
contains
the
data
included
in
the
push
message
when
included
and
the
user
agent
verified
its
authenticity.
The
value
will
be
set
to
null
in
all
other
cases.
When the user agent receives a push message from the push service , it MUST run the following steps.
null
.
push
event
MUST
NOT
be
fired
for
a
push
message
that
was
not
successfully
decrypted
using
the
key
pair
associated
with
the
push
subscription
.
PushMessageData
instance
with
the
decrypted
plain
text
of
the
push
message
.
Fire
a
functional
event
named
"
push
"
using
PushEvent
on
registration
with
the
following
properties:
data
Then run the following steps in parallel, with dispatchedEvent :
If the same push message has been delivered to a service worker registration multiple times unsuccessfully, acknowledge the receipt of the push message according to [ RFC8030 ].
Acknowledging the push message causes the push service to stop delivering the message and to report success to the application server . This prevents the same push message from being retried by the push service indefinitely.
Acknowledging also means that an application server could incorrectly receive a delivery receipt indicating successful delivery of the push message . Therefore, multiple rejections SHOULD be permitted before acknowledging; allowing at least three attempts is recommended.
The pushsubscriptionchange event indicates a change in a push subscription that was triggered outside of the application's control, for example because it has been refreshed, revoked or lost.
To
fire
the
"
pushsubscriptionchange
"
event
given
a
service
worker
registration
of
registration
,
newSubscription
and
oldSubscription
,
the
user
agent
must
fire
a
functional
event
named
"
pushsubscriptionchange
"
using
PushSubscriptionChangeEvent
on
registration
with
the
following
properties:
newSubscription
oldSubscription
Consider using a more reliable synchronization mechanism such as [ WEB-BACKGROUND-SYNC ] when sending the details of the new push subscription to your application server . The user might be subject to unreliable network conditions that could cause a fetch to fail.
WebIDL[Exposed=ServiceWorker, SecureContext]
interface PushSubscriptionChangeEvent
: ExtendableEvent {
constructor
(DOMString type, optional PushSubscriptionChangeEventInit
eventInitDict = {});
readonly attribute PushSubscription
? newSubscription
;
readonly attribute PushSubscription
? oldSubscription
;
};
The
newSubscription
attribute,
when
getting,
returns
the
value
it
was
initialized
to.
The
oldSubscription
attribute,
when
getting,
returns
the
value
it
was
initialized
to.
WebIDLdictionary PushSubscriptionChangeEventInit
: ExtendableEventInit {
PushSubscription
newSubscription
= null;
PushSubscription
oldSubscription
= null;
};
The
newSubscription
member
details
the
push
subscription
that
is
valid
per
invocation
of
the
pushsubscriptionchange
event.
The
value
will
be
null
when
no
new
push
subscription
could
be
established,
for
example
because
the
web
application
has
lost
express
permission
.
The
oldSubscription
member
details
the
push
subscription
that
SHOULD
NOT
be
used
anymore.
The
value
will
be
null
when
the
user
agent
is
not
able
to
provide
the
full
set
of
details,
for
example
because
of
partial
database
corruption.
The Push API does not provide any means itself to present data it receives from a push service . Instead, the Push API relies on other APIs – primarily the Notifications API Standard – to present received information to an end user. As such, there are no accessibility requirements for the Push API itself. However, specifications such as [ NOTIFICATIONS ] provide guidance how to present notifications in an accessible manner.
Further, presenting an accessible interface might depend on transferring more information than a push message can convey. Push messages are best suited to carrying small amounts of content or identifiers. Any larger resources need to be fetched from servers.
As well as sections marked as non-normative, all authoring guidelines, diagrams, examples, and notes in this specification are non-normative. Everything else in this specification is normative.
The key words MAY , MUST , MUST NOT , SHOULD , and SHOULD NOT in this document are to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here.
This specification defines conformance criteria that apply to a single product: the user agent that implements the interfaces that it contains.
WebIDLdictionary PushPermissionDescriptor
: PermissionDescriptor {
boolean userVisibleOnly
= false;
};
[SecureContext]
partial interface ServiceWorkerRegistration {
readonly attribute PushManager
pushManager
;
};
[Exposed=(Window,Worker), SecureContext]
interface PushManager
{
[SameObject] static readonly attribute FrozenArray<DOMString> supportedContentEncodings
;
Promise<PushSubscription
> subscribe
(optional PushSubscriptionOptionsInit
options = {});
Promise<PushSubscription
?> getSubscription
();
Promise<PermissionState> permissionState
(optional PushSubscriptionOptionsInit
options = {});
};
[Exposed=(Window,Worker), SecureContext]
interface PushSubscriptionOptions
{
readonly attribute boolean userVisibleOnly
;
[SameObject] readonly attribute ArrayBuffer? applicationServerKey
;
};
dictionary PushSubscriptionOptionsInit
{
boolean userVisibleOnly
= false;
(BufferSource or DOMString)? applicationServerKey
= null;
};
[Exposed=(Window,Worker), SecureContext]
interface PushSubscription
{
readonly attribute USVString endpoint
;
readonly attribute EpochTimeStamp? expirationTime
;
[SameObject] readonly attribute PushSubscriptionOptions
options
;
ArrayBuffer? getKey
(PushEncryptionKeyName
name);
Promise<boolean> unsubscribe
();
PushSubscriptionJSON
toJSON
();
};
dictionary PushSubscriptionJSON
{
USVString endpoint
;
EpochTimeStamp? expirationTime
= null;
record<DOMString, USVString> keys
;
};
enum PushEncryptionKeyName
{
"p256dh
",
"auth
"
};
[Exposed=ServiceWorker, SecureContext]
interface PushMessageData
{
ArrayBuffer arrayBuffer
();
Blob blob
();
any json
();
USVString text
();
};
[Exposed=ServiceWorker, SecureContext]
partial interface ServiceWorkerGlobalScope {
attribute EventHandler onpush
;
attribute EventHandler onpushsubscriptionchange
;
};
[Exposed=ServiceWorker, SecureContext]
interface PushEvent
: ExtendableEvent {
constructor
(DOMString type, optional PushEventInit
eventInitDict = {});
readonly attribute PushMessageData
? data
;
};
typedef (BufferSource or USVString) PushMessageDataInit
;
dictionary PushEventInit
: ExtendableEventInit {
PushMessageDataInit
data
;
};
[Exposed=ServiceWorker, SecureContext]
interface PushSubscriptionChangeEvent
: ExtendableEvent {
constructor
(DOMString type, optional PushSubscriptionChangeEventInit
eventInitDict = {});
readonly attribute PushSubscription
? newSubscription
;
readonly attribute PushSubscription
? oldSubscription
;
};
dictionary PushSubscriptionChangeEventInit
: ExtendableEventInit {
PushSubscription
newSubscription
= null;
PushSubscription
oldSubscription
= null;
};
The editors would like to express their gratitude to the Mozilla and Telefónica Digital teams implementing the Firefox OS Push message solution, as well as to the following people who provided significant technical input to this document: Antonio Amaya, Miguel García Arribas, Ben Bangert, Kit Cambridge, José Manuel Cantera, JR Conlin, Albert Crespell, Matt Gaunt, Phil Jenvey, Guillermo López, Nikhil Marathe, John Mellor, Pınar Özlen, Fernando R. Sela, Shijun Sun and Doug Turner.
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in:
Referenced in: