Development #71880
Poser une configuration minimale correcte pour les cookies CSRF et de session
Start date:
30 November 2022
Due date:
% Done:
0%
Estimated time:
Patch proposed:
Yes
Planning:
No
Description
Au minimum SESSION_COOKIE_SECURE=True, CSRF_COOKIE_SECURE=True, SESSION_COOKIE_SAMESITE='None' et CSRF_COOKIE_SAMESITE = 'Lax'.
Files
Related issues
Associated revisions
settings: set samesite flag on cookies when possible (#71880)
History
Updated by Benjamin Dauvergne 2 months ago
- Related to Bug #71788: Problème de déconnexion lors de connexions à certain SP en SAML2 added
Updated by Benjamin Dauvergne 2 months ago
- File 0001-settings-set-cookie-SECURE-and-SAMESITE-attributes-7.patch 0001-settings-set-cookie-SECURE-and-SAMESITE-attributes-7.patch added
- Status changed from Nouveau to Solution proposée
- Patch proposed changed from No to Yes
Updated by Benjamin Dauvergne 2 months ago
Updated by Benjamin Dauvergne 2 months ago
Updated by Benjamin Dauvergne 2 months ago
- Status changed from Solution validée to Résolu (à déployer)
commit 4b3bcd01499a396a7a122b355a9dc95213eeb934 Author: Benjamin Dauvergne <bdauvergne@entrouvert.com> Date: Wed Nov 30 15:27:52 2022 +0100 settings: set samesite flag on cookies when possible (#71880) commit d8d29e2daa3733687710a7c5f185cceaf00bf011 Author: Benjamin Dauvergne <bdauvergne@entrouvert.com> Date: Wed Nov 30 14:43:02 2022 +0100 settings: set secure flag on cookies (#71880) Tests fixes : * force https scheme in webtest HTTP client * add secure=True to call with the django HTTP client * replace http scheme by https in URLs assertions, * properly use response.form in tests directly using app.post, as CSRF checks on secure connection also test the Referrer * manually add Referer header in other cases,
Updated by Transition automatique about 1 month ago
- Status changed from Résolu (à déployer) to Solution déployée
settings: set secure flag on cookies (#71880)
Tests fixes :