Skip to content

fix: Stop upgrading http requests to https automatically from browser context #258

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from

Conversation

mdotwills
Copy link

Addresses #243

Previously, it was not possible to make a http request from the web client as the request would be transparently upgraded to https. This was consequence of an applied content security policy header with a directive to upgrade insecure requests.

This change removes this CSP tag, meaning http requests are no longer forcibly upgraded.

Raised in firecamp-dev#243

Previously, it was not possible to make a http request from the web client as
the request would be transparently upgraded to https. This was consequence of
an applied content security policy header with a directive to upgrade insecure
requests.

This change removes this CSP tag, meaning http requests are no longer forcibly
upgraded.
Copy link

netlify bot commented Jan 17, 2025

👷 Deploy request for staging-firecamp-dev pending review.

Visit the deploys page to approve it

Name Link
🔨 Latest commit de872d4

@CLAassistant
Copy link

CLA assistant check
Thank you for your submission! We really appreciate it. Like many open source projects, we ask that you sign our Contributor License Agreement before we can accept your contribution.
You have signed the CLA already but the status is still pending? Let us recheck it.

@mdotwills mdotwills changed the title fix: Allow http requests to be made from browser context fix: Stop upgrading http requests to https automatically from browser context Jan 17, 2025
mdotwills referenced this pull request in Sebb955/firecamp Jan 22, 2025
@mdotwills
Copy link
Author

Prefer #253 over this approach, so closing

@mdotwills mdotwills closed this Mar 14, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants