-
Notifications
You must be signed in to change notification settings - Fork 183
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
What if callerOrigin is an opaque origin #172
Comments
In particular, you can only determine that if the origin has a host and the host is not an IP address of some kind. |
(See the WHATWG HTML Standard for the actual terms you need to use here.) |
i believe @annevk is referring to: https://html.spec.whatwg.org/multipage/browsers.html#origin |
@annevk - can you explain what the problem would be? Is there something in the spec that wouldn't work for opaque origins? |
Yes, see OP. |
this issue is closely related to #171 and will be addressed as part of addressing the latter. |
I would propose that we do not handle such cases for now. For v1 I would focus on the core use case of an interactive user in an active browsing context. |
You need to handle it somehow. You can't just leave things undefined (or in this case, cause a segfault). |
see https://www.w3.org/TR/html51/browsers.html#opaque-origin for definition of opaque origin. |
You really want to be using https://html.spec.whatwg.org/multipage/browsers.html#concept-origin-opaque as a reference at all times. The copy-and-pasters of that work [HTML51] don't always do a good job. |
In what situations would such opaque origins appear? |
Data URLs and sandboxing, at least. |
I see two potential approaches to deal with such situation: Approach 1: Remember: outside the web use case, Apps can also create such scoped authentication credentials. But instead of scoping the credential to some web server the App might be talking to, we scope the credential to the App itself. A web browser apparently can act on behalf of some RP identified by a non-opaque origin, or it could act as an App, i.e. within the scope of a browser vendor. Approach 2: Opinions? |
I think you should just make it fail, fwiw. |
Clarifying my earlier comment - this is what I was trying to say too. By "not handle it" I meant "treat it as a failure case and don't worry about it, if there is a legitimate need for it someone will come along to tell us soon enough". |
Yes, approach 2, am crafting spec text to that end. |
You can't get a public suffix out of that.
The text was updated successfully, but these errors were encountered: