-
Notifications
You must be signed in to change notification settings - Fork 24.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(#34627): forward Authorization header from original request on re… #36946
base: main
Are you sure you want to change the base?
Conversation
Hi @srascar-bubble! Thank you for your pull request and welcome to our community. Action RequiredIn order to merge any pull request (code, docs, etc.), we require contributors to sign our Contributor License Agreement, and we don't seem to have one on file for you. ProcessIn order for us to review and merge your suggested changes, please sign at https://code.facebook.com/cla. If you are contributing on behalf of someone else (eg your employer), the individual CLA may not be sufficient and your employer may need to sign the corporate CLA. Once the CLA is signed, our tooling will perform checks and validations. Afterwards, the pull request will be tagged with If you have received this in error or have any questions, please contact us at cla@meta.com. Thanks! |
Base commit: 9e5c963 |
Thank you for signing our Contributor License Agreement. We can now accept your code for this (and any) Meta Open Source project. Thanks! |
any update on this ? |
Can we expand the fix to forward all of the original headers, as is specified in the fetch standard? ref: whatwg/fetch#553 |
This PR is stale because it has been open 180 days with no activity. Remove stale label or comment or this will be closed in 7 days. |
Any reason for this not being merged? I remember this being quite a nasty bug |
…direct
Fix #34627
Summary:
IOS Specific issue.
HTTP Authorization header is not passed to the sub-request when server responds with a 3xx code
Changelog:
[IOS] [FIXED] - Forward Authorization header from original request on redirect
Test Plan
Additional information
It would be nice to have a little bit more control on this rule. Maybe limit header forwarding to urls with the same origin, or it applies if and only if an option is set at request creation (ex:
forwardHeadersOnRedirect: true
)