-
Notifications
You must be signed in to change notification settings - Fork 149
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
what method name to use #1614
Comments
Just my .02. Using However, I'm not sure it's a good idea. It seems to me that one of the critical things to do is to get a positive indication from the user agent that the request they're sending doesn't have write-through, so a So that makes me lean towards the status quo, (1), or (4) as being more straightforward. Reusing an already-deployed name has been discussed elsewhere; I'm not convinced that it's going to add a lot of value, considering that most traffic is HTTPS now and so intermediaries with fixed lists of supported methods are much less common. If we had data that they'd get through e.g., an enterprise virus scanning proxy whereas a new method wouldn't, I'd be interested to see that. Still, if If we're going to consider new names, I'd suggest |
If the point of this exercise is to make safe-ness visible to intermediaries, then a method is the right place to put that signal. I'm comfortable enough with (I think that we should continue discussion about cache keys separately.) |
I value a lot the ability for intermediaries to filter out write requests before they reach an application. Reusing |
Interim discussion: switch document to use |
(opening this so it has a discussion venue)
Currently, the spec uses "SEARCH" (for the reasons given in the spec).
Alternatives:
The obvious drawback in "pick a new name" is the forseealke bike-shedding.
The text was updated successfully, but these errors were encountered: