-
-
Notifications
You must be signed in to change notification settings - Fork 21.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Another improvement on the HTTPRequest documentation #52381
Another improvement on the HTTPRequest documentation #52381
Conversation
And I have no idea why the static checks are breaking. Does anyone know why? |
Seems to be this: pypa/setuptools-scm#608 We'll look into it. |
Is this actually the case? I was always convinced that when using HTTPS, the only bit of information that could leak to third parties was the domain name browsed due to DNS queries being made over a unencrypted protocol. Of course, query strings may be logged in HTTP server logs regardless, which makes them a bad idea for sending credentials and the like. |
Good points! On a quick search I found these topics:
What you said seems to be accurate. But should we warn the user about the logs or let it be? I feel more inclined to raising awareness when possible. I can adjust the PR if you think it's a good idea. Otherwise we can just drop it. |
And also when using SNI. But as noted, HTTP request headers are encrypted in SSL. I'm okay with mentioning potential pitfalls, but we should not bring false informations. |
Alright, let me fix it and then we can decide after that. |
150525f
to
af83b9e
Compare
Done! Thanks for the information. I learned something 🎉 I hope the way I wrote it is correct and objective enough. |
Even if So, this is not exactly correct, and might generate even more confusion :/ |
More learning! Let me clean up that part some more. |
510f773
to
a71a8fc
Compare
Okay, is this version better? |
I'd just replace it with a comment stating that requests transmitting sensitive information should use encryption and to avoid using GET parameters for such information if possible. |
a71a8fc
to
ec18270
Compare
Thanks everyone for the input! |
Thanks for sparking this discussion :) For me, the new text currently says:
Recommending POST requests this heavily just because of sensitive data seems ill advised. In common use, the main difference being GET and POST is retrieving data vs. submitting/modifying data (i.e, posting). (See REST.) So we should
Something like this?
|
ec18270
to
75530c5
Compare
@mhilbrunner I've changed it to your wording but I've done it in a new note as the previous paragraph was already quite dense. Please let me know what you think 👍 |
Thanks for helping to improve the docs :) |
Raising flag about lack of encryption when sending data as a query string in the URL.
Sorry, I had just opened a PR on this same part of the documentation, but I think this is a rather important piece of information to be delivered to our gamedev folks.