Set HttpOnly and Secure flags in session cookies #5911
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Why are the changes needed?
Setting these 2 fields is standard practice. All modern browsers implement them.
What changes were proposed in this pull request?
We set
HttpOnly
andSecure
flags in all cookies produced by Flyte. Notice that those are generated only if auth is enabled.More information about those flags:
Currently we allow the use of auth without TLS, but I'm wondering if we should remove that case (or disallow it explicitly).edit: This is a common setup. We now have a separate config to control whether cookies have the
Secure
header set. This is supposed to be used only for testing as it potentially exposes users who serve flyteconsole with TLS disabled and auth enabled to aforementioned attacks.How was this patch tested?
Setup process
Screenshots
Check all the applicable boxes
Related PRs
Docs link