-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Name suggestions #2
Comments
@arturjanc also suggested "Sec-Requesting-Origin", as there are concerns it might cause compatibility issues if this information was added to the Similarly we mustn't forget the |
https://mobile.twitter.com/mikewest/status/996625224878776320
|
It's "Sec-" for secure, and defined as an extension point for the set of "forbidden header names" that can't be set in XHR or fetch(). |
Thanks for starting this thread, @craigfrancis!
Neither of these seem appealing to me, as they're both fairly narrow (and the latter doesn't even apply anymore, since we're no longer delivering the origin explicitly).
It's not that odd! The explainer even mentions that similarity explicitly: https://github.com/mikewest/sec-metadata#why-bundle-these-up-into-one-header-why-not-have-one-header-for-each-distinct-value-like-client-hints :) It's worth evaluating, but I think I prefer the current model, where we bundle up a set of properties that I expect would be evaluated together into one header, rather than a model where we add a new request header for each bit of data. |
@mikewest ... Agreed, seeing it as a generic header, where more metadata/properties can be added later, makes me think Now the off-topic question is... when I read the explainer document, was it your comment about Client Hints that got me thinking about it, or was I half asleep at the time and skipped that bit. Feel free to close this issue if you're happy with the name (I am). |
Headers are always metadata, so |
Right. "Metadata" is a dumb name. But it's what we've got at the moment... :) Perhaps (We need the |
@Jxck @mikewest
|
in other policy like CSP or Origin-Policy are defined by Content Author, so it's if |
Shorter is better, given that we'll be taking up bytes on every outgoing request with whatever we name this header. I'm still leaning towards |
Since I don't disagree with @mikewest about enough these days, I'm going to go ahead and express a personal preference for |
in the future we can extends other the
So I still on (of-course, browser need |
Well it is, and if that is a source of confusion depends on the individual to disassociate between them. |
I think it can be |
We landed on "Fetch Metadata" and |
Suggestions for
Sec-Metadata
header name.Original suggestion from @arturjanc was "Sec-Site"
I'm wondering if it needs to be explicitly state "Sec-" (for Security), as this information might be useful for other purposes.... maybe performance, as you could split processing time logs between the different initiators/destinations; or log the number of requests which are same-site vs cross-site.
Oddly this reminds me of Client Hints, in that it's the client telling the server more about what the request will be used for.
The text was updated successfully, but these errors were encountered: