-
Notifications
You must be signed in to change notification settings - Fork 202
Description
Firefox started to complain in developer console that:
Cookie “some_session” will be soon rejected because it has the “sameSite” attribute set to “none” or an invalid value, without the “secure” attribute. To know more about the “sameSite“ attribute, read https://developer.mozilla.org/docs/Web/HTTP/Headers/Set-Cookie/SameSite
Okay? That's new. Some reading later I found that it's a new XSS prevention scheme championed by Google. Browsers will start to look for an additional string in Cookies, an attribute... Well, should I worry about it now? Mh. But when FF starts to complain about it, .. it will probably be an issue in a few months time.
That's why I dug around in Dancer module sources. I use Dancer::Session::Cookie a lot and first thought the root of that warning would be there. Wrong. As it seems for me, it's deeper in Dancer's core, namely in Dancer::Cookie.pm Please tell me if I'm wrong: from what I see there's no means in _to_header() to set an additional attribute to the raw cookie string generated there. Even if calling code, modules like Dancer::Session::Cookie, would care about it, try to set it, etc.
Am I on the wrong track here? Or, if not: did anyone else run into this? Or is there already a stance of the Dancer devs on it, why it's not cared about?
Thanks and cheers to everyone on the Dancer team for making one of the finest Module/frameworks on CPAN!