-
Notifications
You must be signed in to change notification settings - Fork 889
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support Same-site cookies #2733
Comments
This is actually an issue for webob and a duplciate of Pylons/webob#255. However I'm going to leave this open and rephrase it. Pyramid should add support for |
Is this actually RFC yet? Or is it still experimental? I need to write some docs with the experimental stuff so that rapid changes can be made as the standard evolves rather than having to worry about backwards compatibility. |
Actually now that I read it, there is no |
@mmerickel @ztane Any ideas if this planned any time soon? |
I have merged support for it into WebOb, but it is not yet in a release. |
What is the next step here, now that this is landed in webob. Is this something that I could help with? |
Well, |
Should this bug be closed then? Or is there more work to do? |
@alex thanks for checking! Webob itself (thus pyramid's response object) supports samesite cookies on |
@bertjwregeer @mmerickel I am using Pyramid 1.10.4 and I had issues setting samesite=None like it never came to cookie, so the cookie always used default samesite='Lax'. We tried to find a reason, and finally got it to work using 'None' as a string.
I am not sure this is expected, but it works. Thanks |
The string |
Hey @mmerickel yes actually I think docs are misleading https://docs.pylonsproject.org/projects/pyramid/en/latest/api/authentication.html check samesite section. It talks about 'Lax' and None as a non string. It would be awesome to mention explicitly that None has to be passed as a string. Hope it is not just me who got confused :) |
I'm more concerned that it sounds like you're saying If that's the case, please open a new ticket with that bug report. |
The browser then converts that to |
Please support Same-site cookies in
pyramid.response.set_cookie
. This new standard provides protection against CSRF attacks and Google Chrome has already implemented it.The text was updated successfully, but these errors were encountered: