Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[SECURE-CONTEXTS] should be a normative rather than informative reference #29

Closed
dbaron opened this issue Apr 11, 2017 · 7 comments · Fixed by #35
Closed

[SECURE-CONTEXTS] should be a normative rather than informative reference #29

dbaron opened this issue Apr 11, 2017 · 7 comments · Fixed by #35

Comments

@dbaron
Copy link
Member

dbaron commented Apr 11, 2017

The specification currently says:

The URL must be a potentially trustworthy URL as defined in the [SECURE-CONTEXTS] specification.

but then includes [SECURE-CONTEXTS] in the informative references section. The use of must in the above sentence (but see #28) makes me think that this should instead be a normative reference.

@dbaron
Copy link
Member Author

dbaron commented Apr 11, 2017

(I got here from w3ctag/design-reviews#152.)

@marcoscaceres
Copy link
Member

I don't think we actually want this link at all. It's used for "Potentially Trustworthy URLs", which leads to:

If origin’s scheme is either "https" or "wss", return "Potentially Trustworthy".

And I don't think we want people using "wss://" URLs for identifiers. We might as well just do a scheme is "https" check instead.

@ianbjacobs
Copy link
Contributor

Please bring this question back to the WG as it made a conscious decision that "always requiring HTTPS" might be overconstraining.

@marcoscaceres
Copy link
Member

The spec already required HTTPS (or wss:). Again, quoting:

origin’s scheme is either "https" or "wss", return "Potentially Trustworthy".

The change doesn't change what was already specified.

Are you saying that someone in the WG wanted to use web socket URLs? That wouldn't make sense.

@ianbjacobs
Copy link
Contributor

See this issue:
#17

And discussion here:
http://www.w3.org/2017/02/23-wpwg-minutes.html

The goal was not to overconstrain the syntax. The text you found was our attempt to do that.

Ian

@marcoscaceres
Copy link
Member

Well, now that we are actually implementing, we need this.

It blocks Payment Request CR:
w3c/payment-request#464 (comment)

I don't see why it would be helpful to have rando URLs schemes, apart from being a "nice to have".

@marcoscaceres
Copy link
Member

Ok, rereading the [SECURE-CONTEXTS], I'll reintegrate potentially trusted into the validation algo.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants