-
Notifications
You must be signed in to change notification settings - Fork 3k
Define "secure context" #5659
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Define "secure context" #5659
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
One thing I was thinking of is renaming the internal concept to "secure environment" to more accurately capture what it is about.
source
Outdated
|
||
<ol> | ||
<li> | ||
<p>If <var>environment</var> is an <span>environment settings object</span>, and its <span |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
No need for a comma.
Hmm, I guess HTTPS state should be checked although there's only a single implementation who cares about "deprecated" at the moment and that's Chrome. But that seems fairly easy to add. An environment is not a secure context if its HTTPS state is "deprecated". We might also want to expose the API in worklets at some point, but I guess we can wait until there are requests and we wouldn't want to use this PR to add new features anyway. |
OK, force-pushed a new commit that takes into account HTTPS state (which led to some algorithm restructuring), and also a separate commit on top of this which uses the resulting definition for COOP. |
I agree that would have been a better name from the beginning, but the current terminology is so deeply embedded in how we talk about security on the web, I'd rather not shift things now. |
|
This supersedes the definition in https://w3c.github.io/webappsec-secure-contexts/, and fixes several bugs while doing so. Closes #5558. Closes w3c/webappsec-secure-contexts#56. Closes w3c/webappsec-secure-contexts#57. Closes w3c/webappsec-secure-contexts#74. Closes w3c/webappsec-secure-contexts#75.
Fixes #5669. This also fixes existing mismatched parameter passing to the "obtain a cross-origin opener policy" algorithm.
Alright, force-pushed to update both commits to address those points. PTAL! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If we get many things like COOP we might need another abstraction layer, but hopefully we don't. Ideally @mikewest would look at this, but I haven't been able to get in touch either...
This supersedes the definition in
https://w3c.github.io/webappsec-secure-contexts/, and fixes several bugs
while doing so.
Closes #5558. Closes w3c/webappsec-secure-contexts#56. Closes
w3c/webappsec-secure-contexts#57. Closes
w3c/webappsec-secure-contexts#74. Closes
w3c/webappsec-secure-contexts#75.
Notes/things to discuss:
data-lt=""
to preserve autolinks the first one. I can't figure out how to preserve autolinks to the middle one as it would require adata-dfn-for=""
, which would break the other two. /cc @tabatkinsisSecureContext
here since that is mentioned as an open item in https://w3c.github.io/webappsec-secure-contexts/#monkey-patching-global-object/browsing-the-web.html ( diff )
/infrastructure.html ( diff )
/origin.html ( diff )
/parsing.html ( diff )
/webappapis.html ( diff )
/workers.html ( diff )