-
Notifications
You must be signed in to change notification settings - Fork 663
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Always follow redirects in network jobs #4905
Conversation
👍 |
Actually, since _followRedirects is always true, we could get rid of it. |
@ogoffart I intentionally left it there for jobs to customize, but we could just as well kill it. |
Olivier also mentioned that this change makes HTTP only connections prey to redirects from mobile hotspots, which could mess with data integrity. We need to find a good solution here, even if it means disabling redirects for HTTP only. |
👎 Please mention the issue ID in the commit and check if this confirms.. |
Behaviour change, move to 2.3? |
This is a move away from the original policy where jobs would only follow redirects in special cases. Two restrictions are in place: 1. We do not allow protocol downgrades (https -> http) 2. We stop redirects after we find them looping (e.g. old = new url, or indirectly when looping 10 times). This is closer to RFC conforming behavior, although currently we will treat 301 replies like they were 302. This is for a separate commit. Error handling (and display) also needs improvement. Addresses #2791
👍 |
We discussed irl that this is not as dangerous as we thought and that we should go for it. |
@guruz: build has passed. +1? |
I don't want to take responsibility for this |
This is a move away from the original policy where jobs would only follow
redirects in special cases.
Two restrictions are in place:
times).
This is closer to RFC conforming behavior, although currently we will treat
301 replies like they were 302. This is for a separate commit.