-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
creating a pull request after Dagstuhl discussions #2
base: master
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice updates! (Disclaimer: I'm not a project member.)
@@ -103,7 +128,7 @@ following options come to mind: | |||
|
|||
```http | |||
Sec-HTTP-State-Options: ..., delivery=same-origin, ... | |||
``` | |||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Accidental deletion?
|
||
_©2018, Google, Inc. All rights reserved._ | ||
[Mike West](https://github.com/mikewest/http-state-tokens), August 2018 to provide a pull request. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I guess the above forked from texts are not supposed to get merged with this PR?
|
||
(_Note: This isn't a proposal that's well thought out, and stamped solidly with the Google Seal of | ||
Approval. It's a collection of interesting ideas for discussion, nothing more, nothing less._) | ||
|
||
(_Note: This is a pull request after fruitful discussions in Dagstuhl) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This would rather belong to the PR comments section I believe?
as they can with cookies today. There's a trivial hurdle insofar as folks would need to declare that | ||
intent by setting the token's `delivery` member, and it's reasonable to expect user agents to react | ||
to that declaration in some interesting ways, but in itself, there's little change in technical | ||
capability. | ||
capability. | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Undo: Accidental whitespace addition..
``` | ||
|
||
This identifier acts more or less like a client-controlled cookie, with a few notable distinctions: | ||
|
||
1. The client controls the token's value, not the server. | ||
1. The client controls the token's value, not the server. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Undo: Accidental whitespace addition..
@@ -265,7 +320,12 @@ key-value pairs set by the server (though I expect healthy debate on that topic) | |||
|
|||
Slowly and gradually. User agents could begin by advertising support for the new hotness by | |||
appending a `Sec-HTTP-State` header to outgoing requests (either setting the value by default, or | |||
allowing developers to opt-in, as per the pivot point discussion above). | |||
allowing developers to opt-in, as per the pivot point discussion above). |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Undo: Accidental whitespace addition..
Hi Mike,
after our discussions, I added the idea of giving the token a purpose and argued why this would be a good idea. Feel free to mutilate as you wish