We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
I noticed that in an HTTP zimit1 scenario, when accessing the ZIM, warc2zim offers to switch to HTTPs in order to allow Service Workers.
When clicking this link, I get the external catcher
As a user, I was surprised by this because it didn't feel like I was going online (and I wasn't).
I wonder if we should relax our isExternalUrl() check to allow identical URLs but on a different scheme 🤔
isExternalUrl()
libkiwix/static/skin/viewer.js
Lines 313 to 320 in 86100b3
The text was updated successfully, but these errors were encountered:
This is a bug IMO.
Sorry, something went wrong.
Seems indeed something to do. Especially we are redirecting our user to a https url.
But for the record, cross-origin differentiate between http and https. I don't think it is important here, but somehow related and good to remember.
Not sure here how would look like the next step?
No branches or pull requests
I noticed that in an HTTP zimit1 scenario, when accessing the ZIM, warc2zim offers to switch to HTTPs in order to allow Service Workers.
When clicking this link, I get the external catcher
As a user, I was surprised by this because it didn't feel like I was going online (and I wasn't).
I wonder if we should relax our
isExternalUrl()
check to allow identical URLs but on a different scheme 🤔libkiwix/static/skin/viewer.js
Lines 313 to 320 in 86100b3
The text was updated successfully, but these errors were encountered: