-
Notifications
You must be signed in to change notification settings - Fork 1.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow RFC6265 Cookies to include optional SameSite attribute. #3040
Comments
Currently, there's 3 defined values present in the draft spec Evaluate if we would need to update org.eclipse.jetty.http.HttpCookie to include this information. |
This could also become a CookieCompliance configurable behavior for the ServerConnector. |
I've been working on some SameSite behavior in Jetty due to the upcoming changes in Google Chrome. If there is interest I could add some tests to my implementation and can provide a pull request. My current implementation updates the I have the default behavior to exclude the specifier by default due to some unexpected browser behaviors [1]. Let me know if there would be any more expectations here. |
@BruceMacD a PR would be great. |
… attribute Signed-off-by: Bruce MacDonald <brucewmacdonald@gmail.com>
Note: The |
The title references https://tools.ietf.org/html/rfc6265 |
…ibute Signed-off-by: Bruce MacDonald <brucewmacdonald@gmail.com>
It works good, but what about the JSESSIONID cookie? This cookie is created internally by Jetty somewhere, how do we make it include the SameSite requirements as well. I see warnings in Chrome browsers about this. |
@sparklton i opened Issue #4247 to discuss this further. |
Per https://tools.ietf.org/html/draft-west-first-party-cookies-07
and https://caniuse.com/#search=samesite
There is a new "SameSite" attribute that the
Set-Cookie
syntax which allows servers to assert that a cookie ought not to be sent along with cross-site requests.The text was updated successfully, but these errors were encountered: