Yes, I've got a positive response from the two 3P APIs  (relatively
popular). One case is already solved and in production, the second one,
responsible for a huge increase on the UKM entries from February - March is
solved and testing right now.

However, I believe we still want to coordinate the launch with other
browsers. Discussions are ongoing in this sense, and so far Firefox
confirmed they are in a similar situation, code complete and ready to ship
if / when we are.

On Mon, May 15, 2023 at 10:57 PM Mike Taylor <miketa...@chromium.org> wrote:

> Hi Javier,
>
> On 4/5/23 5:54 AM, Javier Garcia Visiedo wrote:
>
> For these visual elements, are there any common threads that you could
>> notice? E.g. Any common 3P providers?
>>
>
>  In all cases I've seen, these are 1P requests of the form
> https://foo.example to https://api.foo.example/api/v1/blah. I've not
> found many sites with these visual element impacts, so I've been trying
> to contact them. So far with no luck.
>
> I guess the same question also applies to the non-visual breakage. (you
>> mentioned analytics and personalization providers)
>
>
> These account for the majority of the cases I found, and all but 2 of them
> are 1P.
>
> I have identified two cases of 3P which are quite relevant, and have just
> made contact with them. I will provide an update once I receive feedback.
>
> Any luck hearing back from these sites?
>
>
>
> On Thu, Mar 30, 2023 at 1:35 AM Yoav Weiss <yoavwe...@chromium.org> wrote:
>
>>
>>
>> On Wed, Mar 29, 2023 at 11:01 AM Yoav Weiss <yoavwe...@chromium.org>
>> wrote:
>>
>>>
>>>
>>> On Wed, Mar 29, 2023 at 10:32 AM Javier Garcia Visiedo <
>>> visi...@chromium.org> wrote:
>>>
>>>> Thank you for your quick reply Yoav,
>>>>
>>>> Please find my answers inline.
>>>>
>>>>
>>>> On Wednesday, March 29, 2023 at 4:35:32 PM UTC+9 Yoav Weiss wrote:
>>>>
>>>> Thank you so much, Javier! :) That's some great analysis!
>>>>
>>>> On Wed, Mar 29, 2023 at 7:51 AM Javier Garcia Visiedo <
>>>> visi...@chromium.org> wrote:
>>>>
>>>> Hi all,
>>>>
>>>> Please find the summary of my findings, after analyzing the UKM data.
>>>>
>>>> Currently, the UKM data shows 2,087 distinct domains (eTLD+1) sending a
>>>> wildcard for ACAH and/or ACAO in response to a credentialled request. The
>>>> UKM data is not good at showing events over time, but the use counter
>>>> <https://chromestatus.com/metrics/feature/timeline/popularity/3873>
>>>> indicates the feature use is currently at 0.12% of total page loads, and
>>>> the monthly average of page loads has been steadily increasing since the
>>>> introduction of the use counter.
>>>>
>>>> Out of the 2,087 domains found in the UKM, the top one accounts for
>>>> 39.24% of the total navigations in the UKM (54% within top 20 sites), using
>>>> this feature. The user experience is not visibly impacted for this site, as
>>>> CORS is blocking calls to a publisher.Ads are displayed properly, so
>>>> apparently the blocked calls are impacting some kind of targeted ads API.
>>>> This site came into the data set for the first time in March 2023, and it’s
>>>> very popular, so we expect to observe a big bump on the use counter from
>>>> now on. This site is an outlier in terms of traffic volume, compared to
>>>> other sites present in the UKM, and given the lack of Ux impact we decided
>>>> to exclude it from the analysis presented below, to get a better
>>>> representation for the rest of the sites.
>>>>
>>>> Excluding the top site, we tested the next top 20 domains in number of
>>>> navigations using this feature, accounting for 42% of the total navigation
>>>> in the UKM. In addition to this, we sampled the long tail for 11 more sites
>>>> randomly, for an additional 3,4% of the total navigation in the UKM.
>>>>
>>>> Extrapolating data from the sampling, we classified sites in the
>>>> following categories:
>>>>
>>>>    -
>>>>
>>>>    No Ux impact: 94.85% of the navigations are free from visible user
>>>>    experience impacts. In most cases, CORS policy is blocking calls to
>>>>    personalization or analytics APIs.
>>>>
>>>>
>>>> "CORS policy" here refers to the status quo before this feature ships?
>>>>
>>>>
>>>> No, these calls are blocked when activating the feature
>>>>
>>>
>>> Oh, ok. So these may have invisible breakage, that results in some
>>> ancillary service failure, but that users are unlikely to notice.
>>>
>>
>>>
>>>>
>>>>
>>>>
>>>>
>>>>
>>>>    -
>>>>
>>>>    Impact to critical functionality, overall experience, log-in, etc.:
>>>>    2.6%
>>>>    -
>>>>
>>>>    Impact to ancillary elements being blocked by CORS policy, such as
>>>>    ads or widgets not essential to the overall page functionality: 2.55%
>>>>
>>>> Putting these numbers in context of the total page loads reported by
>>>> the use counter, 0,0062% of the total page loads experience some UX
>>>> regression due to the introduction of this feature. Of these, 0,0031% was
>>>> unusable.
>>>>
>>>> We reached out to the site owners with Ux impacts, and we were able to
>>>> confirm that 100% of the sites identified to have critical impact have
>>>> already migrated out of this feature.
>>>>
>>>> That's a bit higher than what we're typically comfortable with, but
>>>> it's great to hear that sites you reach out to react quickly.
>>>> How much of that impact was in the top 20 (where we can reasonably
>>>> reach out) vs. the long tail (where it'd be significantly harder to
>>>> communicate things beyond deprecation logs and reports)?
>>>>
>>>>
>>>> For sites with high impact (already addressed) 100% were found in the
>>>> top 20.
>>>>
>>>
>>> That's very reassuring, thanks!
>>>
>>>
>>>> For sites where some visual elements are blocked, 55% (1.48% of total
>>>> navigations registered in the UKM for this feature) are part of the top 20,
>>>> 45% in the long tail, with 1.07% of total navigations in the UKM.
>>>>
>>>
>> For these visual elements, are there any common threads that you could
>> notice? E.g. Any common 3P providers?
>> I guess the same question also applies to the non-visual breakage. (you
>> mentioned analytics and personalization providers)
>>
>>
>>
>>>
>>>>
>>>> Happy to further clarify the data if needed.
>>>>
>>>> Thanks
>>>> Javier
>>>>
>>>> On Wednesday, July 13, 2022 at 2:49:30 PM UTC+9 Yoav Weiss wrote:
>>>>
>>>> Hey Javier!
>>>>
>>>> The benefits of UKM is that it can give us a list of URLs that have
>>>> some breakage potential. The laternative is to cross the usecounter with
>>>> HTTPArchive data, but that has a strong bias towards homepages, so may miss
>>>> a lot of pages that require a login and are not the homepage. With a more
>>>> accurate list of URLs, we'd be able to better assess the usage and
>>>> potential breakage.
>>>>
>>>> Cheers :)
>>>> Yoav
>>>>
>>>> On Wed, Jul 13, 2022 at 3:52 AM Javier Garcia Visiedo <
>>>> visi...@chromium.org> wrote:
>>>>
>>>> Hi,
>>>> I am starting a UKM collection review to opt in the existing use
>>>> counter
>>>> <https://chromestatus.com/metrics/feature/timeline/popularity/3873>
>>>> into an UKM. Sorry if my question is too naive, I just wanted to understand
>>>> what benefits would the UKM add over the existing use counter? Or is it the
>>>> intention to add additional metrics to it? Thanks!
>>>> Cheers
>>>> Javier
>>>>
>>>>
>>>> On Thursday, January 27, 2022 at 1:33:19 AM UTC+9 Chris Harrelson wrote:
>>>>
>>>> Hi, just checking in on this intent. From the API owners' perspective,
>>>> we're going to wait for the UKM, thanks.
>>>>
>>>> On Wed, Jan 12, 2022 at 7:41 AM Yutaka Hirano <yhir...@chromium.org>
>>>> wrote:
>>>>
>>>> Hi Yoav,
>>>>
>>>> Thank you for the suggestions. I'll try to add UKM.
>>>>
>>>> > One other question that came up: Is the usage related to developers
>>>> adding the "Authorization" header on their own, or is it something the
>>>> browser sends under certain circumstances? (e.g. when receiving 401
>>>> responses with "WWW-Autenticate" headers)
>>>>
>>>> This is only for authorization headers set by scripts (via fetch() and
>>>> XHR). Authorization headers the browser attaches are out of scope.
>>>>
>>>> On Thu, Jan 6, 2022 at 2:15 AM Yoav Weiss <yoavwe...@chromium.org>
>>>> wrote:
>>>>
>>>> Hey Yutaka!
>>>>
>>>> We discussed this at the API owners meeting today (Daniel, Chris, Alex,
>>>> MikeT and myself).
>>>> It seems like the risk here is too high to remove support as is, and a
>>>> reasonable next step may be to add the metric to UKM and get a more
>>>> detailed view of which sites are using it and how. That would enable us to
>>>> better assess breakage, and reach out to those sites to reduce current
>>>> usage until potential breakage reaches acceptable levels.
>>>>
>>>> One other question that came up: Is the usage related to developers
>>>> adding the "Authorization" header on their own, or is it something the
>>>> browser sends under certain circumstances? (e.g. when receiving 401
>>>> responses with "WWW-Autenticate" headers)
>>>> Would renaming the headers used in such authentication protocols be a
>>>> useful alternative to consider? I'm guessing that doing that would require
>>>> server changes as well, so won't necessarily help with cases of existing
>>>> content, but may help to move newer auth flows to make safer CORS choices.
>>>>
>>>> Cheers :)
>>>> Yoav
>>>>
>>>> On Thursday, December 9, 2021 at 12:17:40 PM UTC+1 Yutaka Hirano wrote:
>>>>
>>>> We've been showing a deprecation message since 94
>>>> <https://chromiumdash.appspot.com/commit/9a817d69a132822ddf2954120e96a3efa2290071>.
>>>> Sadly the deprecation message hasn't decreased the usage so far.
>>>>
>>>> On Thu, Dec 9, 2021 at 1:52 AM Mike West <mk...@chromium.org> wrote:
>>>>
>>>> From my perspective, it's a bit worrying that you found user-visible
>>>> breakage in a random sampling of the otherwise small number of sites that
>>>> fall into this category. As Yoav suggested, there's some additional
>>>> likelihood that we're not seeing some breakage that requires sign-in. It
>>>> might be worthwhile to raise a deprecation warning for this behavior, and
>>>> remove it after giving developers some time to adjust, perhaps with an
>>>> enterprise policy for good measure. I'd be happy with a 3-release timeline,
>>>> with removal thereafter. That might drive the usage down to the point where
>>>> we can reasonably remove it. If it doesn't, we might need to do some more
>>>> research (wiring this counter up to UKM, for instance) to see if we can
>>>> track down more clear sources of potential breakage.
>>>>
>>>> -mike
>>>>
>>>> On Thursday, December 2, 2021 at 6:56:40 AM UTC+1 Yutaka Hirano wrote:
>>>>
>>>> On Thu, Dec 2, 2021 at 12:29 AM Yoav Weiss <yoavwe...@chromium.org>
>>>> wrote:
>>>>
>>>>
>>>>
>>>> On Wed, Dec 1, 2021 at 4:00 PM Yutaka Hirano <yhir...@chromium.org>
>>>> wrote:
>>>>
>>>> Sorry for the delay!
>>>>
>>>> I checked 10 sites. I saw console errors in three sites among them:
>>>>  1. https://cchatty.com/
>>>>  2. https://techrxiv.org/
>>>>  3. https://bodyshake.com/
>>>>
>>>> I only see a visible breakage in 1 (cards in the main panel are
>>>> invisible). On other sites I don't see any visible differences.
>>>> Please note that this feature is related to authorization so it is
>>>> likely to break things when signing in.
>>>>
>>>>
>>>> So it's possible that the breakage only occurs for logged in users, and
>>>> is not something you'd be able to see when spot checking their homepage?
>>>>
>>>>
>>>> Yeah, I think so.
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> On Wed, Dec 1, 2021 at 8:11 PM Yoav Weiss <yoavwe...@chromium.org>
>>>> wrote:
>>>>
>>>> Friendly ping on Chris' question
>>>>
>>>> On Thursday, November 4, 2021 at 8:31:36 PM UTC+1 Chris Harrelson wrote:
>>>>
>>>> Would it be feasible to get a random list of 10-20 sites that hit the
>>>> use counter and see if they are broken badly by this feature?
>>>>
>>>> On Thu, Nov 4, 2021 at 4:54 AM Yutaka Hirano <yhir...@chromium.org>
>>>> wrote:
>>>>
>>>> (friendly ping)
>>>>
>>>> On Mon, Nov 1, 2021 at 1:57 PM Yutaka Hirano <yhir...@chromium.org>
>>>> wrote:
>>>>
>>>> Thank you for the feedback.
>>>>
>>>> Do you have concrete steps for the investigation in your mind?
>>>>
>>>> On Fri, Oct 29, 2021 at 4:30 AM Mike West <mk...@chromium.org> wrote:
>>>>
>>>> I think it's reasonable for us to dig into the data a little bit to
>>>> determine whether the 0.04% number quoted above will result in user-facing
>>>> breakage. Yutaka, is that something you'd be willing to dig into?
>>>>
>>>> The direction seems philosophically correct to me, so I'd like to see
>>>> it ship, but I'd also like to make sure we're not making the web worse for
>>>> users by doing so.
>>>>
>>>> -mike
>>>>
>>>>
>>>> On Thu, Oct 21, 2021 at 12:04 PM Yutaka Hirano <yhir...@chromium.org>
>>>> wrote:
>>>>
>>>>
>>>>
>>>> On Thu, Oct 21, 2021 at 6:25 PM Yoav Weiss <yoavwe...@chromium.org>
>>>> wrote:
>>>>
>>>>
>>>>
>>>> On Thu, Oct 21, 2021 at 9:55 AM Yutaka Hirano <yhir...@chromium.org>
>>>> wrote:
>>>>
>>>> (The implementation CL
>>>> <https://chromium-review.googlesource.com/c/chromium/src/+/3226283> is
>>>> under review. This intent is written as if it's landed.)
>>>>
>>>> Contact emailsyhir...@chromium.org
>>>>
>>>> Specificationhttps://fetch.spec.whatwg.org/#cors-non-wildcard-request-
>>>> header-name
>>>>
>>>> Summary
>>>>
>>>> A CORS non-wildcard request header[1] is an HTTP request header which
>>>> is not covered by the wildcard symbol ("*") in the
>>>> access-control-allow-headers header. "authorization" is the only member of
>>>> CORS non-wildcard request-header. Currently we treat the header as a usual
>>>> header, which is problematic for security reasons. Implement it, and change
>>>> the current behavior. 1: https://fetch.spec.whatwg.org/
>>>> #cors-non-wildcard-request-header-name
>>>>
>>>>
>>>> Blink componentBlink>SecurityFeature>CORS
>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Blink%3ESecurityFeature%3ECORS>
>>>>
>>>> TAG reviewNot needed because this implements an existing feature.
>>>>
>>>> TAG review statusNot applicable
>>>>
>>>> Risks
>>>>
>>>>
>>>> Interoperability and Compatibility
>>>>
>>>> Interoperability risk is low because Mozilla and Apple showed an intent
>>>> to implement this behavior. There is some compatibility risk, as the use
>>>> counter[2] shows 0.04% websites would be affected. To mitigate the risk,
>>>> we've shown a deprecation message for a few milestones.
>>>>
>>>>
>>>> Can you similarly send deprecation reports as well? How long have the
>>>> deprecation messages been in place? Did we see any decline in the numbers?
>>>>
>>>> We've shown the deprecation message since Chrome 94
>>>> <https://chromiumdash.appspot.com/commit/9a817d69a132822ddf2954120e96a3efa2290071>
>>>>  whose
>>>> beta promotion was on Aug 26 and stable release was on Sep 21.
>>>> We use CountDeprecation which sends deprecation reports automatically
>>>> IIUC.
>>>>
>>>> I don't see any decline.
>>>>
>>>>
>>>> Have we looked into which URLs are triggering this? (and if it's a few
>>>> medium-sized properties or many tiny ones)
>>>>
>>>>
>>>> I haven't looked at the data.
>>>>
>>>> Did we try outreach?
>>>>
>>>> No.
>>>>
>>>>
>>>> We have an enterprise policy so that administrators can keep the
>>>> existing behavior. We're planning to remove the policy on Chrome 103. 2:
>>>> https://www.chromestatus.com/metrics/feature/popularity#
>>>> AuthorizationCoveredByWildcard
>>>>
>>>>
>>>> Gecko: Positive Firefox showed a positive signal in a private thread.
>>>>
>>>> WebKit: Positive Apple showed a positive signal in a private thread.
>>>>
>>>> Web developers: No signals
>>>>
>>>>
>>>> Debuggability
>>>>
>>>> We'll show a CORS error to the devtools console.
>>>>
>>>>
>>>> Is this feature fully tested by web-platform-tests
>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>>>> ?Yes
>>>>
>>>> Flag nameCorsNonWildcardRequestHeadersSupport
>>>>
>>>> Requires code in //chrome?False (or, True only for the enterprise
>>>> policy.)
>>>>
>>>> Tracking bughttps://crbug.com/1176753
>>>>
>>>> Estimated milestones
>>>>
>>>> 97
>>>>
>>>> Link to entry on the Chrome Platform Statushttps://chromestatus.com/
>>>> feature/5742041264816128
>>>> --
>>>> You received this message because you are subscribed to the Google
>>>> Groups "blink-dev" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>> an email to blink-dev+unsubscr...@chromium.org.
>>>> To view this discussion on the web visit https://groups.google.com/a/
>>>> chromium.org/d/msgid/blink-dev/CABihn6G2mzUAH_Ghrqmb1xM7XetfKgB%
>>>> 3DMUkX0DED7yWbL4JfGg%40mail.gmail.com
>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABihn6G2mzUAH_Ghrqmb1xM7XetfKgB%3DMUkX0DED7yWbL4JfGg%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>> .
>>>>
>>>> --
>>>> You received this message because you are subscribed to the Google
>>>> Groups "blink-dev" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>> an email to blink-dev+unsubscr...@chromium.org.
>>>> To view this discussion on the web visit https://groups.google.com/a/
>>>> chromium.org/d/msgid/blink-dev/CABihn6GB-CbbCqx0VHa7%3DLoZr%2BZN-
>>>> O7o7XwTGkxXEYQa9OfupQ%40mail.gmail.com
>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABihn6GB-CbbCqx0VHa7%3DLoZr%2BZN-O7o7XwTGkxXEYQa9OfupQ%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>> .
>>>>
>>>> --
>>>> You received this message because you are subscribed to the Google
>>>> Groups "blink-dev" group.
>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>> an email to blink-dev+unsubscr...@chromium.org.
>>>>
>>>> To view this discussion on the web visit https://groups.google.com/a/
>>>> chromium.org/d/msgid/blink-dev/CABihn6EqkidJF3mjfnztmMnKrEpb%
>>>> 3DPTvW-kpW0s_bWCM%3DOXY8A%40mail.gmail.com
>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CABihn6EqkidJF3mjfnztmMnKrEpb%3DPTvW-kpW0s_bWCM%3DOXY8A%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>> .
>>>>
>>>> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAMFgMgw_1WzXH6ewDJQk3bKrz%3DwdPzUp%2B7vRDKpMzeRK%2B43%3DUw%40mail.gmail.com
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAMFgMgw_1WzXH6ewDJQk3bKrz%3DwdPzUp%2B7vRDKpMzeRK%2B43%3DUw%40mail.gmail.com?utm_medium=email&utm_source=footer>
> .
>
> --
> You received this message because you are subscribed to the Google Groups
> "blink-dev" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to blink-dev+unsubscr...@chromium.org.
> To view this discussion on the web visit
> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/0333ba45-d1e2-8afe-0431-0d6254d794e0%40chromium.org
> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/0333ba45-d1e2-8afe-0431-0d6254d794e0%40chromium.org?utm_medium=email&utm_source=footer>
> .
>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to blink-dev+unsubscr...@chromium.org.
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAFM5ELVyBsoan8Yq0JAeFmxcJNhyVWMwh-NyVbMuYPiFr%3D%2B0Sg%40mail.gmail.com.

Reply via email to