-
Notifications
You must be signed in to change notification settings - Fork 149
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SRI: are there more problematic headers? #305
Comments
I think that section is largely bogus. Probably best to revisit it. Those headers would not exclude checks at all. This is why you need to fix Fetch integration. |
To clarify: This means, if we integrate nicely with fetch, you will define the headers for us, so we do not have to? |
I don't see what needs to be defined about those headers? But if something needs to happen, that would need to fall out of integrating with Fetch. |
Maybe we should just kill that section then? I think now that we have switched to requiring CORS, I don't see much point to this section either. |
+1 to remove this section. Since you need to be able to see the contents of a response for it to be eligible at this point, making further distinctions about whether content was "authenticated" or not seems to be of no practical value. |
SRI: Remove problematic headers section (fix #305)
use time element for the date instead of two spans
Section 3.3.2 lists the following headers as making the resource ineligible for integrity checks:
Authorization
orWWW-Authenticate
Refresh
Consider the impact of other headers:
Content-Length
,Content-Range
, etc. Is there danger there?The text was updated successfully, but these errors were encountered: