Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

[Security] Use the session only if it is started when usingSameOriginCsrfTokenManager#59146

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Merged
fabpot merged 1 commit intosymfony:7.2fromCrovitche-1623:fix_59092
Jan 2, 2025

Conversation

Crovitche-1623
Copy link

@Crovitche-1623Crovitche-1623 commentedDec 9, 2024
edited
Loading

QA
Branch?7.2
Bug fix?yes
New feature?no
Deprecations?no
IssuesFix#59092
LicenseMIT

If I understand well, theSameOriginCsrfTokenManager has been created to provide a stateless way of creating CSRF tokens and therefore allow pages with CSRF tokens to be cached.

When usingSymfony\Component\Security\Csrf\SameOriginCsrfTokenManager, I think an additionnal check must be done to ensure that the session is started in addition to verifying that it exists. If not, the CSRF strategy used will be persisted everytime in the session and the stateless check (used with the#[Route] attribute parameter) will therefore never pass.

@carsonbot
Copy link

Hey!

I see that this is your first PR. That is great! Welcome!

Symfony has acontribution guide which I suggest you to read.

In short:

  • Always add tests
  • Keep backward compatibility (seehttps://symfony.com/bc).
  • Bug fixes must be submitted against the lowest maintained branch where they apply (seehttps://symfony.com/releases)
  • Features and deprecations must be submitted against the 7.3 branch.

Review the GitHub status checks of your pull request and try to solve the reported issues. If some tests are failing, try to see if they are failing because of this change.

When two Symfony core team members approve this change, it will be merged and you will become an official Symfony contributor!
If this PR is merged in a lower version branch, it will be merged up to all maintained branches within a few days.

I am going to sit back now and wait for the reviews.

Cheers!

Carsonbot

@carsonbotcarsonbot changed the title[Security][Routing] Use the session only if it is started when usingSameOriginCsrfTokenManager[Routing][Security] Use the session only if it is started when usingSameOriginCsrfTokenManagerDec 9, 2024
@carsonbot
Copy link

Hey!

Thanks for your PR. You are targeting branch "7.3" but it seems your PR description refers to branch "7.2".
Could you update the PR description or change target branch? This helps core maintainers a lot.

Cheers!

Carsonbot

@Crovitche-1623Crovitche-1623 changed the base branch from7.3 to7.2December 9, 2024 14:17
@Crovitche-1623
Copy link
Author

Maybe you could you take a look@nicolas-grekas ? 🙏

@nicolas-grekasnicolas-grekas modified the milestones:7.3,7.2Jan 2, 2025
@carsonbotcarsonbot changed the title[Routing][Security] Use the session only if it is started when usingSameOriginCsrfTokenManager[Security] Use the session only if it is started when usingSameOriginCsrfTokenManagerJan 2, 2025
Copy link
Member

@nicolas-grekasnicolas-grekas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

I made some changes to also not trigger session usage tracking.

Crovitche-1623 reacted with thumbs up emoji
@Crovitche-1623
Copy link
Author

Thanks !

@fabpot
Copy link
Member

Thank you@Crovitche-1623.

Crovitche-1623 reacted with heart emoji

@fabpotfabpot merged commite36382c intosymfony:7.2Jan 2, 2025
10 of 11 checks passed
@Crovitche-1623Crovitche-1623 deleted the fix_59092 branchJanuary 2, 2025 20:48
@fabpotfabpot mentioned this pull requestJan 29, 2025
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment
Reviewers

@fabpotfabpotfabpot approved these changes

@nicolas-grekasnicolas-grekasnicolas-grekas approved these changes

@chalasrchalasrchalasr approved these changes

Assignees
No one assigned
Projects
None yet
Milestone
7.2
Development

Successfully merging this pull request may close these issues.

[Routing][Security] When a#[Route] is marked asstateless: true and theSameOriginCsrfTokenManager.php, the check fails
5 participants
@Crovitche-1623@carsonbot@fabpot@nicolas-grekas@chalasr

[8]ページ先頭

©2009-2025 Movatter.jp