-
Notifications
You must be signed in to change notification settings - Fork 10.3k
Set SameSiteMode for cookies in authentication tests #25281
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
FYI @BrennanConroy |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is there somethingwe need product wise here?
Merging this without waiting for the checks to pass as this is blocking many other PRs. |
Do the wasm tests not run cross origin? |
There's still the issue with the java tests, right? |
@javiercn If we have a template for Blazor WASM + Identity server, we might want to consider including the same SameSite guards that we use in our OIDC sample (ref). Alternatively, we can document it and refer users to blog posts like this one.
Not these particular tests. They run on a hosted Blazor WASM app running on a single port. |
* Set SameSiteMode for cookies in authentication tests (#25281) * Fix SignalR typescript tests with Chrome SameSite reaction (#25283) * Disable template tests that use Selenium Co-authored-by: Brennan <[email protected]> Co-authored-by: Doug Bunting <[email protected]>
Chrome (as of v80) enforces a strict check on cookie settings. Cookies set with SameSiteMode=None must be marked as secure.
The Identity.Server sets the SameSiteMode to None by default. This PR sets the SameSiteMode to
Lax
by default since the WASM auth tests do not run on an HTTPS server.I verified this by confirming that a Register -> Log in -> visit preferences flow works on the Authentication app.