-
Notifications
You must be signed in to change notification settings - Fork 711
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Set HttpOnly and Secure flags in session cookies #5911
Set HttpOnly and Secure flags in session cookies #5911
Conversation
Signed-off-by: Eduardo Apolinario <[email protected]>
Signed-off-by: Eduardo Apolinario <[email protected]>
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #5911 +/- ##
==========================================
+ Coverage 36.71% 36.95% +0.23%
==========================================
Files 1304 1310 +6
Lines 130081 131470 +1389
==========================================
+ Hits 47764 48587 +823
- Misses 78147 78662 +515
- Partials 4170 4221 +51
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
Signed-off-by: Eduardo Apolinario <[email protected]>
I feel like it’s pretty normal to run plaintext from an ingress to an origin on the same node. At least that’s what we do. |
Signed-off-by: Eduardo Apolinario <[email protected]>
…n all cookies Signed-off-by: Eduardo Apolinario <[email protected]>
Signed-off-by: Eduardo Apolinario <[email protected]>
* Set HttpOnly and Secure cookies in all cookies * Set HttpOnly and Secure cookies in logout cookies * Fix lint warning * Set `Secure` flag only if `Secure` is set on flyteadmin config * Add a separate config to control whether we set the `Secure` header in all cookies * Run `make -C flyteadmin generate` --------- Signed-off-by: Eduardo Apolinario <[email protected]> Co-authored-by: Eduardo Apolinario <[email protected]>
Why are the changes needed?
Setting these 2 fields is standard practice. All modern browsers implement them.
What changes were proposed in this pull request?
We set
HttpOnly
andSecure
flags in all cookies produced by Flyte. Notice that those are generated only if auth is enabled.More information about those flags:
Currently we allow the use of auth without TLS, but I'm wondering if we should remove that case (or disallow it explicitly).edit: This is a common setup. We now have a separate config to control whether cookies have the
Secure
header set. This is supposed to be used only for testing as it potentially exposes users who serve flyteconsole with TLS disabled and auth enabled to aforementioned attacks.How was this patch tested?
Setup process
Screenshots
Check all the applicable boxes
Related PRs
Docs link