aboutsummaryrefslogtreecommitdiffstats
path: root/includes/session
diff options
context:
space:
mode:
authorBrad Jorsch <bjorsch@wikimedia.org>2016-01-25 14:15:40 -0500
committerBrad Jorsch <bjorsch@wikimedia.org>2016-01-25 14:25:09 -0500
commit4eeff5b559e2ae7b8fa1f45572968ba28573a421 (patch)
tree6aef2cc5a30b5c01ded357184ed699165a38adfb /includes/session
parent7491b52f700e220814a8190781fd794b4dd88a20 (diff)
downloadmediawikicore-4eeff5b559e2ae7b8fa1f45572968ba28573a421.tar.gz
mediawikicore-4eeff5b559e2ae7b8fa1f45572968ba28573a421.zip
Use $wgSecureCookie to decide whether to actually mark secure cookies as 'secure'
The pre-SessionManager code did this, and the change in combination with the API not honoring forceHTTPS led to T124252. Bug: T124252 Change-Id: Ic6a79fbb30491040facd7c200b1f47d6b99ce637
Diffstat (limited to 'includes/session')
-rw-r--r--includes/session/CookieSessionProvider.php5
1 files changed, 4 insertions, 1 deletions
diff --git a/includes/session/CookieSessionProvider.php b/includes/session/CookieSessionProvider.php
index 915127ff3c8d..2d01d1d0f408 100644
--- a/includes/session/CookieSessionProvider.php
+++ b/includes/session/CookieSessionProvider.php
@@ -176,7 +176,10 @@ class CookieSessionProvider extends SessionProvider {
$forceHTTPS = $session->shouldForceHTTPS() || $user->requiresHTTPS();
if ( $forceHTTPS ) {
- $options['secure'] = true;
+ // Don't set the secure flag if the request came in
+ // over "http", for backwards compat.
+ // @todo Break that backwards compat properly.
+ $options['secure'] = $this->config->get( 'CookieSecure' );
}
$response->setCookie( $this->params['sessionName'], $session->getId(), null,