-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Treat http://foo.com -> https://foo.com requests as Sec-Fetch-Site: cross-site
.
#34
Comments
Chrome's made this change, and it seems quite reasonable to me. I'll update the spec. In fact, I wonder if we can/should change this more generally for URL's "same site" definition, as it's something we run into in ~all the "same-site" checks we're introducing these days. In fact, WDYT, @annevk? |
I'm supportive. We could have schemeless same site or some such for the variant that only takes hosts. https://fetch.spec.whatwg.org/#cross-origin-resource-policy-check also needs schemeless btw, even though it ends up checking the scheme a bit. |
Closing this out, as it's fixed in 4316583. Moving the broader discussion to whatwg/url#448. |
I filed #41 as a follow-up. |
This is a follow-up for https://crbug.com/979257. Could you please update the spec to change how it determines whether to use the
cross-site
value for theSec-Fetch-Site
header? Currently the spec only says:I think it also needs to consider schemes.
The text was updated successfully, but these errors were encountered: