-
-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
frontend: Category links double-redirect through a non-SSL request #3138
Comments
Hmm, this is a strange behavior. The most puzzling part is that it redirects to a non-https address. tc39/ecma262#231 is a report of the same issue. As I opened a ticket with GitHub support. If they can't fix it we could either restore the trailing slashes, which I'd rather not do, or look at a different hosting option. For example, we could use Netlify or S3. Alternatively perhaps we could serve these requests off our own servers, placing our own CDN in front. |
If GitHub fixes the issue, the double-redirect will go away and we'll have a single redirect. Specifically, https://shields.io/category/coverage will redirect to https://shields.io/category/coverage/, and then after the page loads, Gatsby will modify the location to again read https://shields.io/category/coverage. With different hosting, we may be able to avoid the redirect / rewriting but I don't expect GitHub to change it, nor is it really causing a problem. |
Yeah, it's not super important, I was just scanning the frontend for 404s etc and came across this, so i thought I'd report it. Personally I'd just add the domain to the HTST preload list, but that doesn't seem to work either with GitHub. |
I definitely think we should fix that https->http redirect. Getting HSTS preloaded seems like a nice idea, too. Do you know why it doesn't work with GitHub? |
It seems the SSL certificate for the |
Hmm, the site already doesn't work at https://www.shields.io/, so if anything, blocking http://www.shields.io/ is probably useful. |
I think you are missing something in your DNS. You need to add a For example http://www.getbootstrap.com/. It still does redirect back to http at some point but finally resolves to https. |
Not sure about that; |
hmm, then it might a limitation of GitHub pages and custom domains with SSL. |
Response from GitHub: they're aware of this issue, but there is no ETA on a solution. They recommend "always trying to include the trailing slash where an unsafe redirect is not ideal." Given this issue goes back to 2014, I take it to mean that they're not prioritizing high degrees of compatibility or flexibility on GitHub Pages. |
Have you thought switching to Netlify? |
There's some discussion at #3026 about evaluating other CDNs. That's been focused on the badge server, though we could consider the frontend as well. It also seems possible that it might be possible to host everything on one app, which would make deployment easier, especially in a PaaS environment. The frontend would have to be served from a subfolder and the CDN would need to route requests appropriately based on the path. I don't think Cloudflare supports that, but some other CDNs do. |
Is there any CDN that offers this stuff without cookies or inline JS and thus passing the traffic through the origin? Netlify uses their own CDN, not sure what exactly, but this would be only for the website. I don't think GitHub is actually investing any time on improving GitHub pages for a long time now. BTW, I still don't get why can't you have the So, if you can make this work, you could add the HSTS header. This doesn't really fix the issue for new users, though. |
So, personally, I'd just go back to Cloudflare. This should fix all issues, and everyone knows it's quite good. If someone has a serious problem with their cookies, they can disable them. It shouldn't affect all other things just for those few people, IMO. |
Initially posted here, but since I didn't get a reply I thought I'd report it in a separate issue.
This seem to happen for all category links.
The text was updated successfully, but these errors were encountered: