Also, are you planning to have a deprecation period with e.g. console
errors to let developers know this will break soon?

On Thu, Aug 26, 2021, 17:54 Yoav Weiss <[email protected]> wrote:

> 3 are needed
>
> On Thu, Aug 26, 2021, 17:53 Matt Menke <[email protected]> wrote:
>
>> Is one LGTM enough for intent-to-deprecates, or do I need 3?
>>
>> On Mon, Aug 23, 2021 at 3:50 AM Yoav Weiss <[email protected]>
>> wrote:
>>
>>> Seems like we've got a positive signal from Mozilla, along with a spec
>>> bug <https://github.com/whatwg/url/issues/632>.
>>>
>>> LGTM1 to remove, while fixing that issue in spec (and potentially in
>>> implementation)
>>>
>>> On Sun, Aug 22, 2021 at 10:52 PM Matt Menke <[email protected]> wrote:
>>>
>>>> Sorry, that should be "before instantiating content" (Or "before
>>>> calling ContentMain")
>>>>
>>>> On Sun, Aug 22, 2021 at 4:51 PM Matt Menke <[email protected]> wrote:
>>>>
>>>>> I've poked around here, and I'm not sure it's possible to wire this up
>>>>> to a base::Feature.  Headless runs some code before instantiating context,
>>>>> including parsing a remote debugging IP address from the command line.
>>>>> This results in calling the IPv4 parser before content, and thus the 
>>>>> global
>>>>> feature list, is loaded, which results in the feature code CHECKing.  Even
>>>>> if we figured out a way to work around this, I'm concerned that other code
>>>>> not exercised by the trybots may be doing the same thing, which could
>>>>> result in a lot of unexpected surprises.
>>>>>
>>>>> I guess we could add a command line switch to bypass the check, though
>>>>> that's more difficult to use than a base::Feature, and can't be set
>>>>> server-side. Open to other ideas.
>>>>>
>>>>> On Fri, Aug 20, 2021 at 10:16 AM Matt Menke <[email protected]> wrote:
>>>>>
>>>>>> On second thought, doesn't seem to be any benefit to a partial
>>>>>> rollout on prerelease channels, so probably just land it with an enabled 
>>>>>> by
>>>>>> default base::Feature.
>>>>>>
>>>>>> On Fri, Aug 20, 2021 at 7:57 AM Matt Menke <[email protected]> wrote:
>>>>>>
>>>>>>> I'm planning to ship it behind a feature (enabled by default, after
>>>>>>> experimenting on pre-release channels) to allow emergency disabling.
>>>>>>>
>>>>>>> On Fri, Aug 20, 2021 at 12:53 AM Yoav Weiss <[email protected]>
>>>>>>> wrote:
>>>>>>>
>>>>>>>> OK, I'm convinced that these are not "real" hosts, and that
>>>>>>>> breaking them will not result in actual user-visible breakage. Would 
>>>>>>>> it be
>>>>>>>> possible to ship this with a server-side flag that'd enable us to 
>>>>>>>> quickly
>>>>>>>> revert in case we're wrong?
>>>>>>>>
>>>>>>>> On Thu, Aug 19, 2021 at 6:09 PM Matt Menke <[email protected]>
>>>>>>>> wrote:
>>>>>>>>
>>>>>>>>> So given information on this thread, I think the ways these can
>>>>>>>>> succeed are possibly:
>>>>>>>>> 1)  Entries in the HOSTS file.
>>>>>>>>> 2)  Intermediary DNS servers or MitMs typo squatting, or actively
>>>>>>>>> attacking the user.
>>>>>>>>> 3)  Local DNS servers providing additional DNS results.
>>>>>>>>> 4)  Suffix search (which would trigger on, e.g., "1533.67.89" but
>>>>>>>>> not "67.89.1533")
>>>>>>>>> 5)  mDNS
>>>>>>>>> 6)  Local tools injecting DNS lookup results.
>>>>>>>>>
>>>>>>>>> Unfortunately, we don't have a good way to gather hard data on
>>>>>>>>> which are more common.  Given that there are potential security
>>>>>>>>> implications here, I'm reluctant to wait for another round of data
>>>>>>>>> gathering, though we could probably distinguish cases 4) and 5) from 
>>>>>>>>> the
>>>>>>>>> others, and 1) as well, at least on some platforms.  Also not sure how
>>>>>>>>> useful just knowing about those cases would be.
>>>>>>>>> On Thursday, August 19, 2021 at 11:54:29 AM UTC-4 Harald
>>>>>>>>> Alvestrand wrote:
>>>>>>>>>
>>>>>>>>>> Thanks - I misremembered which end of the class B network got
>>>>>>>>>> jammed together. 67.89.31533 is indeed the one that is "legal" 
>>>>>>>>>> syntax, and
>>>>>>>>>> so of course 67.89.1 is too.
>>>>>>>>>>
>>>>>>>>>>
>>>>>>>>>> On Thu, Aug 19, 2021 at 3:20 PM Matt Menke <[email protected]>
>>>>>>>>>> wrote:
>>>>>>>>>>
>>>>>>>>>>> Note that 127.0.1 is mapped to 127.0.0.1 by GURL, following the
>>>>>>>>>>> URL spec, so that would generally not make it to the DNS resolver 
>>>>>>>>>>> (unless
>>>>>>>>>>> something tried to resolve it directly).  Per the URL spec, 
>>>>>>>>>>> "31533.67.89"
>>>>>>>>>>> would not be normalized by GURL, but "67.89.31533" would be 
>>>>>>>>>>> converted to
>>>>>>>>>>> 67.89.123.45.  My instrumentation was at the DNS layer, so 
>>>>>>>>>>> "127.0.1" and
>>>>>>>>>>> "67.89.31533" would not show up as problematic hostnames in my 
>>>>>>>>>>> metrics,
>>>>>>>>>>> though "31533.67.89" would.
>>>>>>>>>>>
>>>>>>>>>>> On Thu, Aug 19, 2021 at 9:10 AM Harald Alvestrand <
>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> An interesting property of all-numeric hostnames is that they
>>>>>>>>>>>> *may* be legitimate IPv4 addresses using highly archaic IP address 
>>>>>>>>>>>> formats
>>>>>>>>>>>> - we're so used to the 123.45.67.89 syntax that we forget that 
>>>>>>>>>>>> 31533.67.89
>>>>>>>>>>>> once was regarded as a legitimate way to encode the same address 
>>>>>>>>>>>> (class B
>>>>>>>>>>>> notation).
>>>>>>>>>>>>
>>>>>>>>>>>> There are also certain resolvers that will "helpfully" map an
>>>>>>>>>>>> all-numeric hostname presented in DNS to an IP address without 
>>>>>>>>>>>> asking
>>>>>>>>>>>> anyone.
>>>>>>>>>>>> So if those two bugs (or "archaic features") occur together,
>>>>>>>>>>>> the result may be a successful resolution.
>>>>>>>>>>>>
>>>>>>>>>>>> No idea why it would occur more often on Android than on
>>>>>>>>>>>> Windows, though. And my Linux boxes don't resolve 127.0.1 to 
>>>>>>>>>>>> anything.
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>>
>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:42 PM Yoav Weiss <
>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>
>>>>>>>>>>>>> Interesting! What happens then in the "successful resolution"
>>>>>>>>>>>>> case Matt mentioned?
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:39 PM Harald Alvestrand <
>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>
>>>>>>>>>>>>>> Department of odd facts:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> - The ICANN rules for new TLDs forbid all top level domain
>>>>>>>>>>>>>> names that start with a digit
>>>>>>>>>>>>>> - The IDNA rules for bidirectional scripts forbid domain
>>>>>>>>>>>>>> names that start with a digit (Unicode bidi afficandoes will 
>>>>>>>>>>>>>> know why)
>>>>>>>>>>>>>> - The only real reason why leading digits aren't outlawed in
>>>>>>>>>>>>>> domain names at the second level is 3com.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> It seems safe to say that no legitimate fully qualified
>>>>>>>>>>>>>> hostname will ever have a last component consisting only of 
>>>>>>>>>>>>>> digits.
>>>>>>>>>>>>>> That means the only time we could get a legitimate hostname
>>>>>>>>>>>>>> is for something that has to be resolved via a search path.
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>
>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:33 PM Yoav Weiss <
>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 2:28 PM Matt Menke <
>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> I created the title using Chrome Status's deprecation
>>>>>>>>>>>>>>>> template, so any confusion should be blamed on that.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> +Jason Robbins - on the title issues.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> I used the "Draft Intent to Deprecate and Remove email"
>>>>>>>>>>>>>>>> button, and assume I'd need to do a "Draft Intent to Ship 
>>>>>>>>>>>>>>>> email" before
>>>>>>>>>>>>>>>> shipping to stable, after a 50% trial on prerelease channels.
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>> There's no need for 2 emails for removals. We can discuss
>>>>>>>>>>>>>>> the full deprecation, experimentation/trials and removal on 
>>>>>>>>>>>>>>> stable here.
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>> On Thu, Aug 19, 2021 at 3:15 AM Yoav Weiss <
>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:36 PM Matt Menke <
>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 5:23 PM Yoav Weiss <
>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 11:18 PM Matt Menke <
>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 4:53 PM Yoav Weiss <
>>>>>>>>>>>>>>>>>>>> [email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> On Wed, Aug 18, 2021 at 8:47 PM 'Matt Menke' via
>>>>>>>>>>>>>>>>>>>>> blink-dev <[email protected]> wrote:
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Contact [email protected]
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> ExplainerNone
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Specificationhttps://url.spec.whatwg.org/
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Summary
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses, but
>>>>>>>>>>>>>>>>>>>>>> end in numbers are treated as valid, and looked up via 
>>>>>>>>>>>>>>>>>>>>>> DNS (e.g.,
>>>>>>>>>>>>>>>>>>>>>> http://foo.127.1/). Per the Public Suffix List spec,
>>>>>>>>>>>>>>>>>>>>>> the eTLD+1 of the hostname in that URL should be 
>>>>>>>>>>>>>>>>>>>>>> "127.1". If that is ever
>>>>>>>>>>>>>>>>>>>>>> fed back into a URLs, "http://127.1/
>>>>>>>>>>>>>>>>>>>>>> <http://127.0.0.1/>" is mapped to "http://127.0.0.1/";
>>>>>>>>>>>>>>>>>>>>>> by the URL spec, which seems potentially dangerous. 
>>>>>>>>>>>>>>>>>>>>>> "127.0.0.0.1" could
>>>>>>>>>>>>>>>>>>>>>> also potentially be used to confuse users. We want to 
>>>>>>>>>>>>>>>>>>>>>> reject URLs with
>>>>>>>>>>>>>>>>>>>>>> these hostnames.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Blink componentInternals>Network>DNS
>>>>>>>>>>>>>>>>>>>>>> <https://bugs.chromium.org/p/chromium/issues/list?q=component:Internals%3ENetwork%3EDNS>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Motivation
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Most hostnames that aren't valid IPv4 addresses, but
>>>>>>>>>>>>>>>>>>>>>> end in numbers are treated as valid hostnames, and 
>>>>>>>>>>>>>>>>>>>>>> looked up via DNS.
>>>>>>>>>>>>>>>>>>>>>> Example hostnames: 127.0.0.0.1, foo.0.1, 10.0.0.09, 
>>>>>>>>>>>>>>>>>>>>>> 08.1.2.3. These can be
>>>>>>>>>>>>>>>>>>>>>> problematic for the following reason: * "
>>>>>>>>>>>>>>>>>>>>>> http://foo.127.1/"; has an eTLD+1 of "127.1", per the
>>>>>>>>>>>>>>>>>>>>>> public suffix list spec. If that's ever used as the 
>>>>>>>>>>>>>>>>>>>>>> hostname in a new URL,
>>>>>>>>>>>>>>>>>>>>>> however, as in "http://127.1 <http://127.0.0.1/>",
>>>>>>>>>>>>>>>>>>>>>> it will then get mapped to "http://127.0.0.1/";, per
>>>>>>>>>>>>>>>>>>>>>> the URL spec, which is a different host, which is not 
>>>>>>>>>>>>>>>>>>>>>> safe. * "
>>>>>>>>>>>>>>>>>>>>>> http://127.0.0.0.1"; and "http://1.2.3.09";, both of
>>>>>>>>>>>>>>>>>>>>>> which are looked up via DNS rather than failing or being 
>>>>>>>>>>>>>>>>>>>>>> treated as IPv4
>>>>>>>>>>>>>>>>>>>>>> hostnames, also seem potentially confusing. While no 
>>>>>>>>>>>>>>>>>>>>>> exploit is currently
>>>>>>>>>>>>>>>>>>>>>> known here, we want to remove support for these as a 
>>>>>>>>>>>>>>>>>>>>>> preventative security
>>>>>>>>>>>>>>>>>>>>>> measure. The URL spec has been updated so that any URL 
>>>>>>>>>>>>>>>>>>>>>> with a hostname
>>>>>>>>>>>>>>>>>>>>>> ending in a number that's not an IPv4 address 
>>>>>>>>>>>>>>>>>>>>>> (including, e.g.,
>>>>>>>>>>>>>>>>>>>>>> http://foo.1./, but not http://foo.1../) is
>>>>>>>>>>>>>>>>>>>>>> considered invalid. Since this is part of the URL spec, 
>>>>>>>>>>>>>>>>>>>>>> not the DNS spec,
>>>>>>>>>>>>>>>>>>>>>> we want to reject these URLs are the GURL layer, for 
>>>>>>>>>>>>>>>>>>>>>> URLs with appropriate
>>>>>>>>>>>>>>>>>>>>>> protocols (http, https, ws, wss, file). For consistency, 
>>>>>>>>>>>>>>>>>>>>>> we should also
>>>>>>>>>>>>>>>>>>>>>> fail DNS lookup attempts of these sorts of hostnames.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Initial public proposal
>>>>>>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> TAG reviewNot required for an Intent to Deprecate, I
>>>>>>>>>>>>>>>>>>>>>> believe.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> TAG review statusNot applicable
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Risks
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Interoperability and Compatibility
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Any URL with an affected hostname will fail to load,
>>>>>>>>>>>>>>>>>>>>>> and will need to be migrated to another hostname. URLs 
>>>>>>>>>>>>>>>>>>>>>> of this form do
>>>>>>>>>>>>>>>>>>>>>> appear to be in use, though it's not clear under what 
>>>>>>>>>>>>>>>>>>>>>> circumstances. No
>>>>>>>>>>>>>>>>>>>>>> entry in the public suffix list is affected. Affected 
>>>>>>>>>>>>>>>>>>>>>> URLs make up no more
>>>>>>>>>>>>>>>>>>>>>> than 0.0003% of hostnames looked up via the host 
>>>>>>>>>>>>>>>>>>>>>> resolver on any platform,
>>>>>>>>>>>>>>>>>>>>>> and are basically not used in any file URLs, according 
>>>>>>>>>>>>>>>>>>>>>> to our metrics.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Do we have reason to believe these hostnames are not
>>>>>>>>>>>>>>>>>>>>> legitimate ones?
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Unfortunately, we have no insight into them - they
>>>>>>>>>>>>>>>>>>>> could be mistyped URLs sent to typo squatting ISPs that 
>>>>>>>>>>>>>>>>>>>> OSX lets through
>>>>>>>>>>>>>>>>>>>> but the Windows host resolver blocks, and various flavors 
>>>>>>>>>>>>>>>>>>>> of Linux treat
>>>>>>>>>>>>>>>>>>>> differently.  Or they could be mapped via a hosts file, or 
>>>>>>>>>>>>>>>>>>>> they could be
>>>>>>>>>>>>>>>>>>>> hostnames that only resolve on public networks.  Could be 
>>>>>>>>>>>>>>>>>>>> some network tool
>>>>>>>>>>>>>>>>>>>> that uses them when installed locally, but is only 
>>>>>>>>>>>>>>>>>>>> available on certain
>>>>>>>>>>>>>>>>>>>> platforms.  No reason to think one possibility is more 
>>>>>>>>>>>>>>>>>>>> likely than the
>>>>>>>>>>>>>>>>>>>> others.
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Do we have UKM for them that would enable us to test a
>>>>>>>>>>>>>>>>>>> random sample?
>>>>>>>>>>>>>>>>>>> I'm concerned about blocking those hostnames if they are
>>>>>>>>>>>>>>>>>>> legitimate, as that's something that a web developer can't 
>>>>>>>>>>>>>>>>>>> do anything
>>>>>>>>>>>>>>>>>>> about.
>>>>>>>>>>>>>>>>>>> So even if the number of hosts is small, I'd like to get
>>>>>>>>>>>>>>>>>>> more certainty that they are *not* legitimate hosts before 
>>>>>>>>>>>>>>>>>>> blocking them.
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> We have UKM on their number (0.0003% of DNS lookups on
>>>>>>>>>>>>>>>>>> OSX, less elsewhere - we can't meaningfully instrument 
>>>>>>>>>>>>>>>>>> percent of
>>>>>>>>>>>>>>>>>> created GURLs), but we don't have their hostnames, what they 
>>>>>>>>>>>>>>>>>> resolve to, or
>>>>>>>>>>>>>>>>>> know anything else about them, unfortunately.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> Navigation to a subset of these as frame URLs were broken
>>>>>>>>>>>>>>>>>> at one point - I'm pretty sure the breakage even made it to 
>>>>>>>>>>>>>>>>>> stable:
>>>>>>>>>>>>>>>>>> https://crbug.com/1173238.  There were no reports of
>>>>>>>>>>>>>>>>>> problems.  Only non-IPv4 URLs where the last two components 
>>>>>>>>>>>>>>>>>> were broken,
>>>>>>>>>>>>>>>>>> though, and it didn't affect subresources.  On OSX and 
>>>>>>>>>>>>>>>>>> Android, over 99% of
>>>>>>>>>>>>>>>>>> successfully resolved problematic hostnames fit into that 
>>>>>>>>>>>>>>>>>> bucket, though on
>>>>>>>>>>>>>>>>>> Linux, only about 2% do.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>> That doesn't give us any hard conclusions, except they're
>>>>>>>>>>>>>>>>>> either not deliberate navigations on OSX/Android, or they're 
>>>>>>>>>>>>>>>>>> not
>>>>>>>>>>>>>>>>>> navigations.
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> :|
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>> One more question: Is this an intent to Prototype or an
>>>>>>>>>>>>>>>>> intent to deprecate? The title is a bit unclear..
>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> On OSX and Android, about 90% of host resolver
>>>>>>>>>>>>>>>>>>>>>> lookups for these hostnames succeed, 60% do on Linux, 
>>>>>>>>>>>>>>>>>>>>>> and 2% on Windows and
>>>>>>>>>>>>>>>>>>>>>> ChromeOS.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Do you know where those failures are coming from?
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Could be typos, could be the Windows and ChromeOS host
>>>>>>>>>>>>>>>>>>>> resolvers don't let them through.  Since we've had no 
>>>>>>>>>>>>>>>>>>>> filed bugs about
>>>>>>>>>>>>>>>>>>>> them, I suspect the failures are not deliberate 
>>>>>>>>>>>>>>>>>>>> navigations or intended
>>>>>>>>>>>>>>>>>>>> network requests.  I'm much more interested in where the 
>>>>>>>>>>>>>>>>>>>> successes are
>>>>>>>>>>>>>>>>>>>> coming from, myself.
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> To allow for emergency disabling in case of wider
>>>>>>>>>>>>>>>>>>>>>> than expected breakage, I intend to add a feature for 
>>>>>>>>>>>>>>>>>>>>>> it, and do a 50%
>>>>>>>>>>>>>>>>>>>>>> field trial on pre-release channels, though plan to just 
>>>>>>>>>>>>>>>>>>>>>> enable the
>>>>>>>>>>>>>>>>>>>>>> feature, rather than do a gradual rollout to stable, 
>>>>>>>>>>>>>>>>>>>>>> given the low usage.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Gecko: Positive (
>>>>>>>>>>>>>>>>>>>>>> https://github.com/whatwg/url/pull/619#issuecomment-890826499
>>>>>>>>>>>>>>>>>>>>>> <https://www.chromestatus.com/admin/features/launch/5679790780579840/1?intent=1>
>>>>>>>>>>>>>>>>>>>>>> )
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> Can you file an official position request?
>>>>>>>>>>>>>>>>>>>>> https://bit.ly/blink-signals
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Done for Mozilla:
>>>>>>>>>>>>>>>>>>>> https://github.com/mozilla/standards-positions/issues/568
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>> Should I also do this for WebKit as well?  They have in
>>>>>>>>>>>>>>>>>>>> process CLs, so not sure if it's still needed.
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>> Agree that in-flight patches for WebKit are a sufficient
>>>>>>>>>>>>>>>>>>> positive signal.
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> WebKit: In development (
>>>>>>>>>>>>>>>>>>>>>> https://bugs.webkit.org/show_bug.cgi?id=228826)
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Web developers: No signals
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Activation
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> This breaks anything using one of these domains, and
>>>>>>>>>>>>>>>>>>>>>> requires migrating to other hostnames.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Security
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> None
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Debuggability
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> These will act like any other invalid URL. Behavior
>>>>>>>>>>>>>>>>>>>>>> is context dependent. Since this is logic deep within 
>>>>>>>>>>>>>>>>>>>>>> GURL, and GURLs are
>>>>>>>>>>>>>>>>>>>>>> created in a great many places, console warnings 
>>>>>>>>>>>>>>>>>>>>>> specifically for this seem
>>>>>>>>>>>>>>>>>>>>>> not practical.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Is this feature fully tested by web-platform-tests
>>>>>>>>>>>>>>>>>>>>>> <https://chromium.googlesource.com/chromium/src/+/master/docs/testing/web_platform_tests.md>
>>>>>>>>>>>>>>>>>>>>>> ?No.  Javascript URL construction is tested, but
>>>>>>>>>>>>>>>>>>>>>> URLs are used in a great many other places, which don't 
>>>>>>>>>>>>>>>>>>>>>> have test
>>>>>>>>>>>>>>>>>>>>>> coverage, since DNS lookups for these domains must 
>>>>>>>>>>>>>>>>>>>>>> succeed in the first
>>>>>>>>>>>>>>>>>>>>>> place for the tests to be meaningful.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Flag name
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Requires code in //chrome?False
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Tracking bughttps://crbug.com/1237032
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Estimated milestones
>>>>>>>>>>>>>>>>>>>>>> DevTrial on desktop 95
>>>>>>>>>>>>>>>>>>>>>> DevTrial on Webview 95
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> Link to entry on the Chrome Platform Status
>>>>>>>>>>>>>>>>>>>>>> https://www.chromestatus.com/feature/5679790780579840
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> This intent message was generated by Chrome Platform
>>>>>>>>>>>>>>>>>>>>>> Status <https://www.chromestatus.com/>.
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>>>>>>>>> You received this message because you are subscribed
>>>>>>>>>>>>>>>>>>>>>> to the Google Groups "blink-dev" group.
>>>>>>>>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving
>>>>>>>>>>>>>>>>>>>>>> emails from it, send an email to
>>>>>>>>>>>>>>>>>>>>>> [email protected].
>>>>>>>>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com
>>>>>>>>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAEK7mvq%2Bfnau%3DE%2BONhe0kr9HOpN84eCpoub84%3DswKzPkrGzi5A%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>>>>>>>> --
>>>>>>>>>>>>>>> You received this message because you are subscribed to the
>>>>>>>>>>>>>>> Google Groups "blink-dev" group.
>>>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails
>>>>>>>>>>>>>>> from it, send an email to [email protected].
>>>>>>>>>>>>>>> To view this discussion on the web visit
>>>>>>>>>>>>>>> https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com
>>>>>>>>>>>>>>> <https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWB4wVuGshgPaLVXp%3DYsWUiXgJhUABD3ZFJ9xbhg1J3ww%40mail.gmail.com?utm_medium=email&utm_source=footer>
>>>>>>>>>>>>>>> .
>>>>>>>>>>>>>>>
>>>>>>>>>>>>>>

-- 
You received this message because you are subscribed to the Google Groups 
"blink-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/a/chromium.org/d/msgid/blink-dev/CAL5BFfWSa--F723gQJyk_9CwWPDySe7X%2Bge7UAut%2BxqmY4ETDg%40mail.gmail.com.

Reply via email to