[
https://issues.apache.org/jira/browse/MYFACES-2848?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12893965#action_12893965
]
Werner Punz commented on MYFACES-2848:
--------------------------------------
Another fix probably would be to strip out the jsf.js upfront on the loaded
code part, but given that this either must be done with a full blown parser or
only partially with regexps I would not do it, if we can fix it on the server
easier.
> AJAX responses contain <script type="text/javascript"
> src="/MyFaces_Test/javax.faces.resource/jsf.js.faces?ln=javax.faces">
> ---------------------------------------------------------------------------------------------------------------------------
>
> Key: MYFACES-2848
> URL: https://issues.apache.org/jira/browse/MYFACES-2848
> Project: MyFaces Core
> Issue Type: Bug
> Components: JSR-314
> Affects Versions: 2.0.1
> Environment: AJAX Java
> Reporter: Ganesh Jung
> Attachments: Test.war
>
>
> The fact that an AJAX request was triggered clearly shows, that jsf.js is
> already available to the browser. Including it again in the response triggers
> another HTTP GET for jsf.js with time and traffic penalty.
--
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.