LGTM3

On Thu, Apr 27, 2023 at 7:14 AM Mike Taylor <miketa...@chromium.org> wrote:

> LGTM2 (sorry for the delay, it seems this fell out of our review queue).
> On 4/27/23 9:56 AM, Jonathan Hao wrote:
>
> Hi Yoav,
>
> It's been 2 weeks but no other API owners have replied.  Do you know if
> there's any blockers?  Should we ping the other API owners or could you
> help us?
>
> Best,
> Jonathan
>
> On Wed, Apr 12, 2023 at 1:26 PM Yoav Weiss <yoavwe...@chromium.org> wrote:
>
>> LGTM1
>>
>> Thanks for explaining! :)
>>
>> On Wed, Apr 12, 2023 at 2:24 PM Jonathan Hao <p...@chromium.org> wrote:
>>
>>>
>>>
>>> On Wed, Apr 12, 2023, 12:45 Yoav Weiss <yoavwe...@chromium.org> wrote:
>>>
>>>>
>>>>
>>>> On Wed, Apr 5, 2023 at 2:02 PM Jonathan Hao <p...@chromium.org> wrote:
>>>>
>>>>> Sorry for the confusion about the spec name.  We've recently changed
>>>>> our stance
>>>>> https://github.com/WICG/local-network-access/issues/91#issuecomment-1494704528
>>>>> and the spec name is still unsettled until we hear back from other browser
>>>>> vendors. Both Private Network Access and Local Network Access mean the 
>>>>> same
>>>>> thing for now.
>>>>>
>>>>> On Wed, Apr 5, 2023, 12:22 Jonathan Hao <p...@chromium.org> wrote:
>>>>>
>>>>>> Note that Private Network Access is in the process of being renamed
>>>>>> to Local Network Access, so you may see inconsistent names for the time
>>>>>> being. Explainer
>>>>>>
>>>>>> https://github.com/WICG/local-network-access/blob/main/explainer.md
>>>>>>
>>>>>> Specification
>>>>>>
>>>>>>
>>>>>> https://wicg.github.io/local-network-access/#secure-context-restriction
>>>>>> <https://wicg.github.io/local-network-access>
>>>>>>
>>>>>> Design docs
>>>>>>
>>>>>> Local Network Access: Allow Potentially Trustworthy Same-Origin
>>>>>> Fetches
>>>>>> <https://docs.google.com/document/d/1XopQKc6sR-2URgKqEleb-XNjcSPOjTI-E5qRxWGBuTY/edit#heading=h.y2euwddkcot>
>>>>>>
>>>>>> Private Network Access: Preflight requests for subresources
>>>>>> <https://docs.google.com/document/d/1FYPIeP90MQ_pQ6UAo0mCB3g2Z_AynfPWHbDnHIST6VI/edit>
>>>>>>
>>>>>> Summary
>>>>>>
>>>>>> Allow same-origin local network fetches to potentially-trustworthy
>>>>>> origins and do not send preflights for them. We currently send preflights
>>>>>> before all local network requests, but ignore the results, as proposed 
>>>>>> in Intent
>>>>>> to Ship: Private Network Access preflight requests for subresources
>>>>>> <https://groups.google.com/u/1/a/chromium.org/g/blink-dev/c/72CK2mxD47c/m/5mkboUneAwAJ>
>>>>>> .
>>>>>>
>>>>>
>>>> Can you expand on this change? Would this result in not sending
>>>> preflights IFF their origin is the same as the document's origin?
>>>>
>>>
>>> Yes. Preflights will not be sent iff the origin is the same as the
>>> documents' origin and the origin is potentially trustworthy.
>>>
>>> Would this also work for embedded documents? (resulting in a single
>>>> preflight for the document's resource, but not subresource)
>>>> Or would it be restricted to cases where the user explicitly went to a
>>>> local network top-level document? (Or something else entirely, and I
>>>> misunderstood)
>>>>
>>>
>>> Yes it works for embedded documents too. The preflight for iframe
>>> navigation is being worked on separately in https://crbug.com/1291252.
>>> If the subresource is same origin to the embedded document then it doesn't
>>> require additional preflights.
>>>
>>>>
>>>>
>>>>>
>>>>>> Blink component Blink>SecurityFeature>CORS>PrivateNetworkAccess
>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS%3EPrivateNetworkAccess>
>>>>>>
>>>>>> TAG review https://github.com/w3ctag/design-reviews/issues/572
>>>>>>
>>>>>> TAG review status Issues addressed
>>>>>>
>>>>>> Risks
>>>>>>
>>>>>> Interoperability and Compatibility
>>>>>>
>>>>>> This change reduces the compatibility risk of enforcing preflight
>>>>>> results on private network requests as we now send fewer preflights for
>>>>>> private network requests, so it’s less likely to break websites.
>>>>>>
>>>>>> Gecko: No signal about this specific change.
>>>>>>
>>>>>> WebKit: No signal about this specific change.
>>>>>>
>>>>>> Web developers: No signal about this specific change, but they
>>>>>> should be happy since this reduces compatibility risks.
>>>>>>
>>>>>> Other signals:
>>>>>>
>>>>>>
>>>>>> Ergonomics
>>>>>>
>>>>>> None.
>>>>>>
>>>>>>
>>>>>> Activation
>>>>>>
>>>>>> We plan to ship this change directly to M114 as this relaxes the
>>>>>> previous restrictions.
>>>>>>
>>>>>> Security
>>>>>>
>>>>>> This change is limited to potentially trustworthy origins. Proof of
>>>>>> certificate protects users from DNS rebinding.
>>>>>>
>>>>>> WebView application risks
>>>>>>
>>>>>> There’s no plan to ship Local Network Access on WebView.
>>>>>>
>>>>>>
>>>>>> Debuggability
>>>>>>
>>>>>> Relevant information (client and resource IP address space) is
>>>>>> already piped into the DevTools network panel. Deprecation warnings and
>>>>>> errors will be surfaced in the DevTools issues panel explaining the 
>>>>>> problem
>>>>>> when it arises.
>>>>>>
>>>>>>
>>>>>> Will this feature be supported on all six Blink platforms (Windows,
>>>>>> Mac, Linux, Chrome OS, Android, and Android WebView)? No
>>>>>>
>>>>>> Not on Android WebView given previous difficulty in supporting PNA
>>>>>> changes due to the lack of support for deprecation trials. Support for
>>>>>> WebView will be considered separately.
>>>>>>
>>>>>>
>>>>>> Is this feature fully tested by web-platform-tests
>>>>>> <https://chromium.googlesource.com/chromium/src/+/main/docs/testing/web_platform_tests.md>
>>>>>> ? No
>>>>>>
>>>>>> DevTrial instructions No DevTrial for this change
>>>>>>
>>>>>> Flag name
>>>>>>
>>>>>> LocalNetworkAccessAllowPotentiallyTrustworthySameOrigin
>>>>>>
>>>>>> Requires code in //chrome?
>>>>>>
>>>>>> Only for metric logging
>>>>>>
>>>>>> Tracking bug
>>>>>>
>>>>>> https://crbug.com/1382068
>>>>>>
>>>>>> Launch bug
>>>>>>
>>>>>> https://crbug.com/1274149
>>>>>>
>>>>>>
>>>>>> Estimated milestones
>>>>>> DevTrial on desktop 114
>>>>>> DevTrial on Android 114
>>>>>> Anticipated spec changes
>>>>>>
>>>>>> Open questions about a feature may be a source of future web compat
>>>>>> or interop issues. Please list open issues (e.g. links to known github
>>>>>> issues in the project for the feature specification) whose resolution may
>>>>>> introduce web compat/interop risk (e.g., changing to naming or structure 
>>>>>> of
>>>>>> the API in a non-backward-compatible way).
>>>>>>
>>>>>> None
>>>>>>
>>>>>> Link to entry on the Chrome Platform Status
>>>>>> https://chromestatus.com/feature/5737414355058688
>>>>>>
>>>>>> Links to previous Intent discussions
>>>>>> Intent to prototype:
>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/ArrhiKB8XF0/m/cGO-5B1IAwAJ
>>>>>> Intent to prototype (all preflights):
>>>>>> https://groups.google.com/a/chromium.org/g/blink-dev/c/PrB0xnNxaHs/m/jeoxvNjXCAAJ
>>>>>> Intent to Experiment (all preflights):
>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOC%3DiP%2Bew8hADZkdQ3AO6P9WzfGuzLPp9JjJZqztV5oZmaK8oQ%40mail.gmail.com
>>>>>>
>>>>>>
>>>>>> This intent message was generated by Chrome Platform Status
>>>>>> <https://chromestatus.com/>.v
>>>>>>
>>>>> --
>>>>> You received this message because you are subscribed to the Google
>>>>> Groups "blink-dev" group.
>>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>>> an email to blink-dev+unsubscr...@chromium.org.
>>>>> To view this discussion on the web visit
>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABsQ2jGAcTV4CUKKwsYYfnQRiQ_W6KK9L4OQ5uNHNGn3WMhZ5Q%40mail.gmail.com
>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABsQ2jGAcTV4CUKKwsYYfnQRiQ_W6KK9L4OQ5uNHNGn3WMhZ5Q%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>> .
>>>>>
>>>> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOC%3DiPLfTRMRBp56AY-DTAAke5kx6dKVfKqc8c6RXVr7tu3MqQ%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOC%3DiPLfTRMRBp56AY-DTAAke5kx6dKVfKqc8c6RXVr7tu3MqQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/288b0a13-287a-0716-13a6-d878bbf73fe4%40chromium.org
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/288b0a13-287a-0716-13a6-d878bbf73fe4%40chromium.org?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAOMQ%2Bw9QUA6fiEt4tXurshEk-9bCP0N8H830iTKeOBvDhu2C_g%40mail.gmail.com.

Reply via email to