Skip to content

Conversation

@minrk
Copy link
Member

@minrk minrk commented Oct 10, 2017

we already apply this logic in our server-side checks, but browsers check Access-Control-Allow-Origin headers themselves as well, meaning that token-authenticated requests can’t be made cross-origin without CORS headers from browsers, only scripts.

This makes default browser and server-side origin checks consistent

includes #2919 to avoid merge conflicts

we already apply this logic in our server-side checks,
but browsers check `Access-Control-Allow-Origin` headers themselves as well,
meaning that token-authenticated requests can’t be made cross-origin without CORS headers from browsers,
only scripts.

This makes default browser and server-side origin checks consistent
@minrk minrk force-pushed the allow-origin-token branch from 014316c to 9acf6a8 Compare October 11, 2017 08:41
@minrk
Copy link
Member Author

minrk commented Oct 11, 2017

My conflict-avoidance strategy was not successful, apparently. Rebased.

@takluyver
Copy link
Member

I'm never entirely sure about these CORS issues, but I think I understand the basic idea, and I'm happy to trust the two of you. Do you want anyone else to review it? Do you want it in for 5.2?

@takluyver takluyver added this to the 5.3 milestone Oct 20, 2017
@takluyver takluyver merged commit 55aa80e into jupyter:master Oct 20, 2017
@gnestor
Copy link
Contributor

gnestor commented Oct 26, 2017

We're going to try to release 5.2.1. Should this be included?

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Apr 4, 2021
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants