On a practical point as a web developer, in this case CSS subgrid is a part
of the wider CSS grid feature. It seems odd to make parts of the CSS grid
feature available in insecure contexts while other parts (subgrid) are
unavailable. I would argue this decision should have been made for the CSS
grid feature as a whole, and apply consistently to all aspects of the CSS
grid feature, so we don't end up with the compatibility nightmare of
bits-and-pieces of features being available in some cases but not others.


On Tue, 22 Oct 2019 at 09:54, James Graham <ja...@hoppipolla.co.uk> wrote:

> On 22/10/2019 00:07, L. David Baron wrote:
> > On Monday 2019-10-21 16:01 -0500, Mike Taylor wrote:
> >> Hi David,
> >>
> >> On 10/21/19 7:22 AM, L. David Baron wrote:
> >>> (That we haven't applied the policy that much because we've granted
> >>> exceptions because other browsers have shipped the features reduces
> >>> the effectiveness of the policy and its ability to meet its goals.
> >>> This is the sort of policy that is most effective if it applies to
> >>> the largest number of thngs, both because it has larger effects and
> >>> because it sets much clearer expectations about what will be limited
> >>> to secure contexts.  I think it's worth considering reducing that
> >>> exception to the existence of actual web compat problems from the
> >>> secure contexts limitation.)
> >>
> >> Can you unpack this a little here?
> >>
> >> Are we saying we would ship features in non-secure contexts because
> sites
> >> theoretically rely on that behavior due to another browser shipping as
> >> non-secure before we did? (This sounds like the current rationale for
> >> exceptions, I think).
> >>
> >> Or are we saying we would ship a feature by default as secure and be
> willing
> >> (compelled?) to move to non-secure if we discover sites rely on other
> >> significant market share browsers not requiring a secure context for
> said
> >> feature -- once our users reported the bugs (or we did some kind of
> analysis
> >> beforehand)?
> >
> > I'm saying that we've been doing what you describe in the first
> > paragraph but maybe we need to shift to what you describe in the
> > second paragraph in order for the policy on secure contexts to be
> > effective.
>
> Shipping a Gecko-first feature limited to secure contexts, when we don't
> have evidence that other browsers will follow suite, runs the risk of
> sites breaking only in Gecko once the feature is widely deployed.
> Although we can always change the configuration after breakage is
> observed, the time taken to receive a bug report, diagnose the issue,
> and ship the fix to users, can be significant. This is a window during
> which we're likely to lose users due to the — avoidable — compatibility
> problems.
>
> I would argue that in the case where:
>
> * There is no compelling security or privacy reason for limiting a
> feature to secure contexts
>
> * There is reason to suspect that other browsers will ship a feature in
> both secure and insecure contexts (e.g. because limiting to secure
> contexts would be significant extra work in their engine, or because
> their past behaviour suggests that the feature will available everywhere)
>
> the trade-off between nudging authors toward https usage, and avoiding
> web-compat hazards should fall on the side of minimising the
> compatibility risk, and so we should ship such features without limiting
> to secure contexts.
>
> Alternatively we could have a policy that allows us to initially ship
> Gecko-first features meeting the above criteria as secure-context only,
> but that requires us to remove the limit if other browsers start
> shipping to their development channels without a secure-context limit.
> That minimises the compatibility risk — assuming we follow through on
> the process — but adds extra bureaucracy and has more steps to go wrong.
> I doubt the incremental effect on https adoption of this policy variant
> is worth the additional complexity, and suggest we should use this
> approach only if we misjudge the intentions of other vendors.
> _______________________________________________
> dev-platform mailing list
> dev-platform@lists.mozilla.org
> https://lists.mozilla.org/listinfo/dev-platform
>
_______________________________________________
dev-platform mailing list
dev-platform@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-platform

Reply via email to