-
Notifications
You must be signed in to change notification settings - Fork 659
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set HttpOnly and Secure flags in session cookies #5911
Set HttpOnly and Secure flags in session cookies #5911
Conversation
Signed-off-by: Eduardo Apolinario <eapolinario@users.noreply.github.com>
Signed-off-by: Eduardo Apolinario <eapolinario@users.noreply.github.com>
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #5911 +/- ##
==========================================
+ Coverage 36.71% 36.95% +0.23%
==========================================
Files 1304 1310 +6
Lines 130081 131470 +1389
==========================================
+ Hits 47764 48587 +823
- Misses 78147 78662 +515
- Partials 4170 4221 +51
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
Signed-off-by: Eduardo Apolinario <eapolinario@users.noreply.github.com>
I feel like it’s pretty normal to run plaintext from an ingress to an origin on the same node. At least that’s what we do. |
Signed-off-by: Eduardo Apolinario <eapolinario@users.noreply.github.com>
…n all cookies Signed-off-by: Eduardo Apolinario <eapolinario@users.noreply.github.com>
Signed-off-by: Eduardo Apolinario <eapolinario@users.noreply.github.com>
Why are the changes needed?
Setting these 2 fields is standard practice. All modern browsers implement them.
What changes were proposed in this pull request?
We set
HttpOnly
andSecure
flags in all cookies produced by Flyte. Notice that those are generated only if auth is enabled.More information about those flags:
Currently we allow the use of auth without TLS, but I'm wondering if we should remove that case (or disallow it explicitly).edit: This is a common setup. We now have a separate config to control whether cookies have the
Secure
header set. This is supposed to be used only for testing as it potentially exposes users who serve flyteconsole with TLS disabled and auth enabled to aforementioned attacks.How was this patch tested?
Setup process
Screenshots
Check all the applicable boxes
Related PRs
Docs link