Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Subresource prefetching+loading via Signed HTTP Exchange #352

Closed
1 of 3 tasks
horo-t opened this issue Mar 12, 2019 · 11 comments
Closed
1 of 3 tasks

Subresource prefetching+loading via Signed HTTP Exchange #352

horo-t opened this issue Mar 12, 2019 · 11 comments
Assignees
Labels
Progress: propose closing we think it should be closed but are waiting on some feedback or consensus Review type: CG early review An early review of general direction from a Community Group Topic: packaging Venue: WICG

Comments

@horo-t
Copy link

horo-t commented Mar 12, 2019

Góðan dag TAG!

I'm requesting a TAG review of:

We'd prefer the TAG provide feedback as (please select one):

  • open issues in our Github repo for each point of feedback
  • open a single issue in our Github repo for the entire review
  • leave review feedback as a comment in this issue and @-notify [@kinu @jyasskin @sleevi]
@horo-t horo-t changed the title Signed Exchange subresource prefetching Subresource prefetching+loading via Signed HTTP Exchange Mar 13, 2019
@annevk
Copy link
Member

annevk commented Mar 14, 2019

Do you have a specification URL that's not a long discussion?

Also, given how prefetching itself still isn't defined from first principles, I'm rather concerned about adding yet more complexity on top.

@horo-t
Copy link
Author

horo-t commented Mar 15, 2019

Sorry we don't have formal specification yet.
The Proposal section in the Explainer may be easier to understand.

@torgo
Copy link
Member

torgo commented May 22, 2019

Discussed at f2f 22-05-2019.

@torgo
Copy link
Member

torgo commented Sep 10, 2019

@horo-t we are picking this up now at our f2f (in Google's Tokyo office btw). It looks like there has been some progress on the WICG web packaging issue that you have referenced above. Can you let us know what the latest status of this is and what type of feedback you would most like to see from the TAG that could help? I see from WICG/webpackage#347 (comment) that there are now 2 explainers? Where would you like the TAG to focus?

@horo-t
Copy link
Author

horo-t commented Sep 11, 2019

During the spec discussion, we focused on how to prevent user tracking.
As described at Security and Privacy Considerations, this feature only exposes 1 bit information because UAs can use the cached signed exchange only if the required signed exchanges are all available.

I'd like the TAG to check if following sound reasonable:

  • The overall use-case / considerations we've made for privacy.
  • Iintroducing a new rel=allowed-alt-sxg link header.
    This new "allowed-alt-sxg" link header is only for signed exchange.
  • Extending the usage of the existing rel=alternate link header.
    The alternate link headers are already widely used for several use cases.

Let me also share our current status in Chromium.
We have implemented in Chromium, and we are planing to start Origin Trial soon.

@torgo
Copy link
Member

torgo commented Dec 3, 2019

@horo-t we are working through this now. Can you provide any feedback from your origin trial?

@torgo torgo added Progress: propose closing we think it should be closed but are waiting on some feedback or consensus and removed Progress: in progress Missing: security & privacy review labels Dec 3, 2019
@torgo
Copy link
Member

torgo commented Dec 3, 2019

@lknik can you take a look at their answers to the security & privacy questionnaire?

@torgo
Copy link
Member

torgo commented Dec 3, 2019

I've put this in "proposed closing" for now as if we are happy with the proposal and with the answers to the security & privacy questionnaire then we might be ready to close this one off.

@ylafon
Copy link
Member

ylafon commented Dec 3, 2019

The extension of rel=alternate seems fine to me, if you consider that it is an alternate format, as it requires specific handling, and not just an alternate URL. (rel=duplicate has been used for the latter use case, not sure about its implementation state). Introducing a specific new link header seems also fine (allowed-alt-xsg).

@horo-t
Copy link
Author

horo-t commented Dec 4, 2019

I received a feedback that the user agent should send a NEL (Network Error Logging) report when there was a the header-integrity mismatch while handling subresource signed exchanges. (https://crbug.com/1025074)

I will update the explainer.

horo-t added a commit to horo-t/webpackage that referenced this issue Dec 4, 2019
I uploaded explainer documents of subresource signed exchanges to my
repository (https://github.com/horo-t/subresource-signed-exchange).
But they should be in this webpackage repository.
So this patch copies them from "horo-t/subresource-signed-exchange"
repository.

Spec issue: WICG#347
TAG review: w3ctag/design-reviews#352
horo-t added a commit to WICG/webpackage that referenced this issue Jan 6, 2020
I uploaded explainer documents of subresource signed exchanges to my
repository (https://github.com/horo-t/subresource-signed-exchange).
But they should be in this webpackage repository.
So this patch copies them from "horo-t/subresource-signed-exchange"
repository.

Spec issue: #347
TAG review: w3ctag/design-reviews#352
@alice alice removed this from the 2019-12-03-f2f-cupertino milestone Jan 27, 2020
@hadleybeeman
Copy link
Member

Since we've had no comments since we proposed closing this issue, and everyone seems happy, we are now closing it. Feel free to open another issue if you'd like to start a new discussion!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Progress: propose closing we think it should be closed but are waiting on some feedback or consensus Review type: CG early review An early review of general direction from a Community Group Topic: packaging Venue: WICG
Projects
None yet
Development

No branches or pull requests

7 participants