New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Origins doesn't anticipate an Origin header with a path [SPR-13478] #18057
Comments
Sébastien Deleuze commented GeorgeCGV I think we have not the same reading of RFC 6454. In the RFC example you quote, Section 6 and 7.1 of the RFC seems pretty clear about Any thoughts? |
George commented Sébastien Deleuze, I think that the Server should consider Regarding I just pushed some changes which will consider origins with the ending |
Sébastien Deleuze commented GeorgeCGV The RFC clearly specifies that the On Spring side, I see 2 improvements we could consider (even if they will not fix directly your problem):
Any thoughts? |
George commented Sébastien Deleuze, just committed last changes. After all,
Restored functionality of
I think it is better to leave this as it is and let the users full control of allowed origins. |
Sébastien Deleuze commented GeorgeCGV When I wrote "the fix initially proposed is the right one", if you follow the link, you will see I was referring to the SocketRocket fix, not to your initial push, sorry if it was not clear. I really appreciate your contribution on this PR, but to the best of my understanding, the current implementation is already RFC 6454 compliant. As a consequence, based on your latest feedback, I just plan to improve exception handling when a malformed |
George commented Sébastien Deleuze,I know what you meant with the fix.
My last commit does exactly this. |
Sébastien Deleuze commented GeorgeCGV I really appreciate your contribution, but your commit introduces too much changes, and I would like to minimize the risk of regressions. I have fixed this issue with this commit that changes less things. |
George commented Sébastien Deleuze, my commit reused what was already introduced and used in the class. Anyway, thank you. |
George opened SPR-13478 and commented
http://domain1.org:8080/
http://domain1.org:80/path/file
DefaultCorsProcessor.processRequest
, due toWebUtils.isSameOrigin
call.http://domain1.com
andhttp://domain1.com/
to be different. The same applies to allowed origins comparison.Everything above doesn't comply to RFC 6454 standard:
I'm not totally sure about
UriComponentsBuilder.fromHttpRequest
but based on the code it may fail the same way asUriComponentsBuilder fromOriginHeader
did. It depends what value can be stored inX-Forwarded-Host
.Affects: 4.2 GA, 4.2.1
Reference URL: facebookincubator/SocketRocket#256
Referenced from: pull request #875, and commits 9c66dfa
The text was updated successfully, but these errors were encountered: