Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

creating a pull request after Dagstuhl discussions #2

Open
wants to merge 1 commit into
base: master
Choose a base branch
from
Open

creating a pull request after Dagstuhl discussions #2

wants to merge 1 commit into from

Conversation

rigow
Copy link

@rigow rigow commented Aug 14, 2018

Hi Mike,

after our discussions, I added the idea of giving the token a purpose and argued why this would be a good idea. Feel free to mutilate as you wish

Copy link

@xkr47 xkr47 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice updates! (Disclaimer: I'm not a project member.)

@@ -103,7 +128,7 @@ following options come to mind:

```http
Sec-HTTP-State-Options: ..., delivery=same-origin, ...
```

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Accidental deletion?


_©2018, Google, Inc. All rights reserved._
[Mike West](https://github.com/mikewest/http-state-tokens), August 2018 to provide a pull request.
Copy link

@xkr47 xkr47 Aug 14, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I guess the above forked from texts are not supposed to get merged with this PR?


(_Note: This isn't a proposal that's well thought out, and stamped solidly with the Google Seal of
Approval. It's a collection of interesting ideas for discussion, nothing more, nothing less._)

(_Note: This is a pull request after fruitful discussions in Dagstuhl)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This would rather belong to the PR comments section I believe?

as they can with cookies today. There's a trivial hurdle insofar as folks would need to declare that
intent by setting the token's `delivery` member, and it's reasonable to expect user agents to react
to that declaration in some interesting ways, but in itself, there's little change in technical
capability.
capability.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Undo: Accidental whitespace addition..

```

This identifier acts more or less like a client-controlled cookie, with a few notable distinctions:

1. The client controls the token's value, not the server.
1. The client controls the token's value, not the server.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Undo: Accidental whitespace addition..

@@ -265,7 +320,12 @@ key-value pairs set by the server (though I expect healthy debate on that topic)

Slowly and gradually. User agents could begin by advertising support for the new hotness by
appending a `Sec-HTTP-State` header to outgoing requests (either setting the value by default, or
allowing developers to opt-in, as per the pivot point discussion above).
allowing developers to opt-in, as per the pivot point discussion above).
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Undo: Accidental whitespace addition..

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants