We're planning to roll this out as a field trial, hopefully starting in
Chrome 115 at 1% Stable in order to keep an eye impact. We've been testing
our implementation in Chrome Canary/Dev/Beta channels for a while now to
help test the feature and polish our implementation, which largely builds
on Chrome's existing "HTTPS-First Mode" (which is enabled for users who
toggle the "Always use secure connections" opt-in in Chrome's settings).

We didn't think that this was a good fit for an Origin Trial as it isn't
really site (or user) exposed.

On Wed, May 24, 2023 at 4:36 PM Rik Cabanier <caban...@gmail.com> wrote:

> This is an awesome change that will make the web better!
> Did you run any experiments or origin trials to see how it works in the
> field? Are you planning on rolling it out slowly to see the impact?
>
> On Wed, May 24, 2023 at 4:13 PM Chris Thompson <cth...@chromium.org>
> wrote:
>
>> Contact emailscth...@chromium.org, dadr...@google.com
>>
>> Explainerhttps://github.com/dadrian/https-upgrade/blob/main/explainer.md
>>
>> Specificationhttps://github.com/whatwg/fetch/pull/1655
>>
>> Summary
>>
>> Automatically and optimistically upgrade all main-frame navigations to
>> HTTPS, with fast fallback to HTTP.
>>
>>
>> Blink componentInternals>Network>SSL
>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3ESSL>
>>
>> TAG reviewFetch change process does not mention a TAG review, therefore
>> this is N/A (https://github.com/whatwg/fetch#pull-requests)
>>
>> TAG review statusNot applicable
>>
>> Risks
>>
>>
>> Interoperability and Compatibility
>>
>>
>>
>> *Gecko*: Positive (
>> https://github.com/mozilla/standards-positions/issues/800) Firefox is
>> offering a similar feature already in their private browsing mode by default
>>
>> *WebKit*: No signal (
>> https://github.com/WebKit/standards-positions/issues/185)
>>
>> *Web developers*: No signals. This feature is not exposed directly to
>> web developers or users. However, HTTPS adoption is now standard practice
>> (>90% of page loads in Chrome use HTTPS), and automatically upgrading
>> navigations to HTTPS would avoid unnecessary redirects from HTTP to HTTPS
>> for site owners. The `upgrade-insecure-requests` header has some similar
>> functionality, and according to HTTP-Archive is found on ~6% of all
>> requests.
>>
>> *Other signals*:
>>
>> WebView application risks
>>
>> Does this intent deprecate or change behavior of existing APIs, such that
>> it has potentially high risk for Android WebView-based applications?
>>
>>
>>
>> Debuggability
>>
>> Chrome will upgrade these navigations to HTTPS using a 307 internal
>> redirect, which will be visible in the Network panel of Developer Tools.
>>
>>
>> Will this feature be supported on all six Blink platforms (Windows, Mac,
>> Linux, Chrome OS, Android, and Android WebView)?No
>>
>> Currently not available on Android WebView. We are implementing this
>> first for Chrome and will consider bringing this to WebView (likely as an
>> embedder opt-in) as follow up work.
>>
>>
>> Is this feature fully tested by web-platform-tests
>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>> ?No
>>
>> Flag namehttps-upgrades
>>
>> Requires code in //chrome?True
>>
>> Tracking bughttps://bugs.chromium.org/p/chromium/issues/detail?id=1394910
>>
>> Launch bughttps://launch.corp.google.com/launch/4235192
>>
>> Sample links
>> http://example.com will upgrade to https://example.com.
>> http://www.alwayshttp.com will upgrade to https://www.alwayshttp.com but
>> fall back to http://www.alwayshttp.com because the site doesn't support
>> HTTPS.
>>
>> Estimated milestones
>> Shipping on desktop 115
>> Shipping on Android 115
>>
>> We are planning to do a field trial to gradually roll out this feature to
>> Chrome clients in Chrome 115.
>>
>> Anticipated spec changes
>>
>> Open questions about a feature may be a source of future web compat or
>> interop issues. Please list open issues (e.g. links to known github issues
>> in the project for the feature specification) whose resolution may
>> introduce web compat/interop risk (e.g., changing to naming or structure of
>> the API in a non-backward-compatible way).
>> https://github.com/whatwg/fetch/pull/1655
>>
>> Link to entry on the Chrome Platform Status
>> https://chromestatus.com/feature/6056181032812544
>>
>> Links to previous Intent discussionsIntent to prototype:
>> https://groups.google.com/a/chromium.org/g/blink-dev/c/mgJqym5-Xek/m/0EAN6v7CCQAJ
>>
>> This intent message was generated by Chrome Platform Status
>> <https://chromestatus.com/>.
>>
>> --
>> You received this message because you are subscribed to the Google Groups
>> "blink-dev" group.
>> To unsubscribe from this group and stop receiving emails from it, send an
>> email to blink-dev+unsubscr...@chromium.org.
>> To view this discussion on the web visit
>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALMy46TuPDmzpr8udxXEythTCMVDBVVuTKwQivGGxm5fhJ-Xfg%40mail.gmail.com
>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALMy46TuPDmzpr8udxXEythTCMVDBVVuTKwQivGGxm5fhJ-Xfg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>> .
>>
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CALMy46T5X9WH1E6A9ZwKhvLGfSnmUcYgQQ9PwgXaZhfXLo%2BuYQ%40mail.gmail.com.

Reply via email to