If this is a MiTM attack from the owner or someone on the WiFi network then the browser will not give a warning to the user as suggested by some of the comments. Your browser has no knowledge that a site should be using Transport Layers Security (TLS/SSL) so how would it know to warn you. If the attacker is trying to inject their own certificate then yes you will get a warning but if you're having the TLS stripped out and being redirected to http:// then you would not. However, due to the implementation of HSTS I don't believe someone could maliciously redirect you away from a secure redirect to Google this way. It's also worth noting that if you manually navigate to https://google.com and don't just type google.com (where the browser would default to http://) then it's not possible for someone to MiTM the secure connection.
There is a program called SSLstrip that would allow you to carry out these forms of MiTM attack on a redirect to a https:// site which you can find here. There is a slightly more detailed explanation of how SSLstrip handles the MiTM attack.