Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Access-Control-Allow-Origin #267

Open
wants to merge 4 commits into
base: luds
Choose a base branch
from

Conversation

shocknet-justin
Copy link
Contributor

01.md Outdated Show resolved Hide resolved
Copy link
Contributor

@Kukks Kukks left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ACK when including @AaronDewes suggestion.

Copy link
Contributor Author

@shocknet-justin shocknet-justin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

split the diff

01.md Outdated
@@ -35,6 +35,10 @@ Once `LNURL` is decoded:

Neither status codes or any HTTP Header has any meaning. Servers may use whatever they want. Clients should ignore them (and be careful when using libraries that treat responses differently based on headers and status codes) and just parse the response body as JSON, then interpret it accordingly.

## CORS Browser Compatibility

Application endpoints or Reverse Proxy directives that are accessed when using the LNURL must respond to `OPTIONS` requests on that endpoint. In their replies to `GET` and `OPTIONS`, they must set the header `Access-Control-Allow-Origin: *` for LNURL's to work with browser-based wallets, services and other webapps. If they set the `Access-Control-Allow-Methods` header, they must set in such a way that `GET` requests are permitted.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Application endpoints or Reverse Proxy directives that are accessed when using the LNURL must respond to `OPTIONS` requests on that endpoint. In their replies to `GET` and `OPTIONS`, they must set the header `Access-Control-Allow-Origin: *` for LNURL's to work with browser-based wallets, services and other webapps. If they set the `Access-Control-Allow-Methods` header, they must set in such a way that `GET` requests are permitted.
Application endpoints that are accessed when using the LNURL must respond to `OPTIONS` requests on that endpoint. In their replies to `GET` and `OPTIONS`, they must set the header `Access-Control-Allow-Origin: *` for LNURL's to work with browser-based wallets, services and other webapps. If they set the `Access-Control-Allow-Methods` header, they must set in such a way that `GET` requests are permitted.

I still disagree with the reference to reverse proxies. A reverse proxy is something completely separate and controlled by the user or platform, not by the application developer.

A reverse proxy is not always part of the application stack, and not under the control of an app developer. For example, BTCPay, which supports LNUrl, can be run on StartOS, Umbrel, ... which may already include a reverse proxy.

Requiring this for apps themselves means apps are correct without users externally modifying something about the app's responses.

If we impose this rule on reverse proxies, a lot of people are going to set Access-Control-Allow-Origin: * for all routes, which will make apps insecure.

Clearly putting the responsibility on the app developer is much better imo.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

That's a very niche subset of reverse proxies and afaik they function more as gateways than reverse proxies, an umbrel user exposing services to the internet would need to reconfigure the reverse proxy anyway for things like SSL and so on... I also explicitly mentioned the directive for the endpoint, of which there would be many in an box like that for various apps

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Still, these proxies are controlled by the user and not the application developer, who is responsible for implementing the spec.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

By exposing an umbrel etc to the internet the user is now a service provider, the box is the application including the customized reverse proxy configuration

It's services that need these fixes, not users.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

By exposing an umbrel etc to the internet the user is now a service provider, the box is the application including the customized reverse proxy configuration

It's services that need these fixes, not users.

Every other part of the spec is implemented by app developers, not users. All of these services have implemented LNURL. No user configured the LNURL handling in their reverse proxy or has to read the spec. Application & library developers have to know them, however.

The application can do this, and the reverse proxy is not needed for such functionality, so it should be part of the app.

Saying "our app may support LNURL" is incredibly bad as a developer and complicates setup for users unnecessarily.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If we're being precise then those are apps, not services

I agree that apps should implement this, but the reality is that many apps are unlikely to be updated for this and are harder for the service provider to update themselves vs. their reverse proxy configuration

I think the spec should talk about apps, and then service providers can fix invalid apps if they choose so, but that should be outside of the spec.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Apps are geared towards services, services which are run by operators that may be trying to figure out why teir app isn't working in certian cases- including searching on the CORS error from their browser

A reference to app directives gives both sides the information they need, and doesn't imply app developers shouldn't do it directly

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

But it may lead app developers to put the responsibility onto users. Not mentioning reverse proxies makes it clear app developers must do it.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The responsibility is already on operators of broken services to fix them, a bad app developer or unmaintained app will deviate no matter whats added to the spec and so verbiage is warranted for both configurations

It's also fair for an app to simply document the external requirement just as it might SSL

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

a bad app developer or unmaintained app will deviate no matter whats added to the spec and so verbiage is warranted for both configurations

Then the app is just broken. The spec is written for correct apps, not for broken apps.

It's also fair for an app to simply document the external requirement just as it might SSL

CORS is something completely different from SSL. For CORS, an app should always handle it itself, because the app developers know what CORS rules are safe.

@hsjoberg
Copy link
Collaborator

Why are we adding OPTIONS requests to LNURL?
It's an all-covering breaking change mandating all LNURL server implementations to support it.

I suggest we remove this.

@AaronDewes
Copy link

Why are we adding OPTIONS requests to LNURL? It's an all-covering breaking change mandating all LNURL server implementations to support it.

I suggest we remove this.

This is necessary for the LNURL to work/be resolved from web browsers.

@AaronDewes
Copy link

I was mistaken, LNURL resolution is considered a "simple" request that does not require options.

@@ -35,6 +35,10 @@ Once `LNURL` is decoded:

Neither status codes or any HTTP Header has any meaning. Servers may use whatever they want. Clients should ignore them (and be careful when using libraries that treat responses differently based on headers and status codes) and just parse the response body as JSON, then interpret it accordingly.

## CORS Browser Compatibility

Application endpoints (or their defined Reverse Proxy directives) accessed when using the LNURL must respond to `GET` having set the header `Access-Control-Allow-Origin: *` for LNURL's to work with browser-based wallets, services and other webapps. If they set the `Access-Control-Allow-Methods` header, they must set in such a way that `GET` requests are permitted.
Copy link

@AaronDewes AaronDewes Jun 17, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
Application endpoints (or their defined Reverse Proxy directives) accessed when using the LNURL must respond to `GET` having set the header `Access-Control-Allow-Origin: *` for LNURL's to work with browser-based wallets, services and other webapps. If they set the `Access-Control-Allow-Methods` header, they must set in such a way that `GET` requests are permitted.
Application endpoints that need to be accessed when interacting with an LNURL must set [CORS headers](https://developer.mozilla.org/en-US/docs/Web/HTTP/CORS) in such a way that they are reachable from any web origin.

Based on feedback from @hsjoberg and @fiatjaf, maybe just this sentence would be best.

No someone else apart from me and @shocknet-justin should probably also decide if we should include reverse proxies, because we don't seem to be able to agree here.

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should at least keep the Access-Control-Allow-Origin: * or/and a link to the MDN describing CORS, to make it easier & more straightforward for devs to actually implement.

The issues is that incorrectly configured CORS is not immediately noticeable by a dev who uses non webapp based wallet (majority of wallets currently), I am worried that if this is not straightforward to implement (e.g. devs having to research what this CORS even means) they might just skip through it thinking their LN service is working all good.

Maybe it'd make sense to have a simple online tool (webapp) for checking whether LNURLs adhere to the spec (including CORS)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@adambor I added your suggestion to my comment above.

@kaloudis @Kukks @adambor What's your opinion about mentioning proxies?

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should remove the mention of proxies to keep the text shorter.

Isn't it already obvious for proxies that CORS header would be required? The proxy is really an "application endpoint" here if I understand it correctly.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Feel like we're bikeshedding on the proxy text. On one hand it's not taking up much space, on the other it also feels obvious to me.

I could go either way, but I lean towards keeping it as is.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great! Two more people disagreeing 🙃

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it's obvious and an unnecessary implementation detail to mention.

@kaloudis
Copy link

Long needed guidance. Thanks for writing this.

ACK

@shocknet-justin
Copy link
Contributor Author

another one... plz merge

https://x.com/shocknet_justin/status/1823134965225128181

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants