Merge branch 'master' into benches

This commit is contained in:
Maxim Vorobjov 2020-01-23 10:11:44 +02:00 committed by GitHub
commit a58aba4e02
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 32 additions and 27 deletions

View File

@ -3,7 +3,6 @@ name: CI (Windows)
on: [push, pull_request] on: [push, pull_request]
env: env:
VCPKG_HASH: 3f62e5d55d1a7d8905df35d5c441d6e9ad64ffdf
VCPKGRS_DYNAMIC: 1 VCPKGRS_DYNAMIC: 1
jobs: jobs:
@ -47,27 +46,15 @@ jobs:
with: with:
path: target path: target
key: ${{ matrix.version }}-x86_64-pc-windows-msvc-cargo-build-${{ hashFiles('**/Cargo.lock') }} key: ${{ matrix.version }}-x86_64-pc-windows-msvc-cargo-build-${{ hashFiles('**/Cargo.lock') }}
- name: Cache vcpkg package
uses: actions/cache@v1
id: cache-vcpkg
with:
path: vcpkg
key: windows_x64-${{ env.VCPKG_HASH }}-vcpkg
- name: Install OpenSSL - name: Install OpenSSL
if: steps.cache-vcpkg.outputs.cache-hit != 'true'
shell: pwsh
run: | run: |
git clone https://github.com/Microsoft/vcpkg.git vcpkg integrate install
cd vcpkg vcpkg install openssl:x64-windows
git reset --hard $VCPKG_HASH Copy-Item C:\vcpkg\installed\x64-windows\bin\libcrypto-1_1-x64.dll C:\vcpkg\installed\x64-windows\bin\libcrypto.dll
.\bootstrap-vcpkg.bat Copy-Item C:\vcpkg\installed\x64-windows\bin\libssl-1_1-x64.dll C:\vcpkg\installed\x64-windows\bin\libssl.dll
.\vcpkg integrate install Get-ChildItem C:\vcpkg\installed\x64-windows\bin
.\vcpkg install openssl:x64-windows Get-ChildItem C:\vcpkg\installed\x64-windows\lib
Copy-Item .\installed\x64-windows\bin\libcrypto-1_1-x64.dll .\installed\x64-windows\bin\libcrypto.dll
Copy-Item .\installed\x64-windows\bin\libssl-1_1-x64.dll .\installed\x64-windows\bin\libssl.dll
Get-ChildItem .\installed\x64-windows\bin
Get-ChildItem .\installed\x64-windows\lib
- name: check build - name: check build
uses: actions-rs/cargo@v1 uses: actions-rs/cargo@v1

View File

@ -1,3 +1,9 @@
## Unreleased
* Setting a cookie's SameSite property, explicitly, to `SameSite::None` will now
result in `SameSite=None` being sent with the response Set-Cookie header.
To create a cookie without a SameSite attribute, remove any calls setting same_site.
## 2.0.0 ## 2.0.0
* `HttpServer::start()` renamed to `HttpServer::run()`. It also possible to * `HttpServer::start()` renamed to `HttpServer::run()`. It also possible to

View File

@ -1,5 +1,11 @@
# Changes # Changes
# [Unreleased]
### Fixed
* Allow `SameSite=None` cookies to be sent in a response.
## [1.0.1] - 2019-12-20 ## [1.0.1] - 2019-12-20
### Fixed ### Fixed

View File

@ -10,18 +10,26 @@ use std::fmt;
/// attribute is "Strict", then the cookie is never sent in cross-site requests. /// attribute is "Strict", then the cookie is never sent in cross-site requests.
/// If the `SameSite` attribute is "Lax", the cookie is only sent in cross-site /// If the `SameSite` attribute is "Lax", the cookie is only sent in cross-site
/// requests with "safe" HTTP methods, i.e, `GET`, `HEAD`, `OPTIONS`, `TRACE`. /// requests with "safe" HTTP methods, i.e, `GET`, `HEAD`, `OPTIONS`, `TRACE`.
/// If the `SameSite` attribute is not present (made explicit via the /// If the `SameSite` attribute is not present then the cookie will be sent as
/// `SameSite::None` variant), then the cookie will be sent as normal. /// normal. In some browsers, this will implicitly handle the cookie as if "Lax"
/// and in others, "None". It's best to explicitly set the `SameSite` attribute
/// to avoid inconsistent behavior.
///
/// **Note:** Depending on browser, the `Secure` attribute may be required for
/// `SameSite` "None" cookies to be accepted.
/// ///
/// **Note:** This cookie attribute is an HTTP draft! Its meaning and definition /// **Note:** This cookie attribute is an HTTP draft! Its meaning and definition
/// are subject to change. /// are subject to change.
///
/// More info about these draft changes can be found in the draft spec:
/// - https://tools.ietf.org/html/draft-west-cookie-incrementalism-00
#[derive(Debug, Clone, Copy, PartialEq, Eq, Hash)] #[derive(Debug, Clone, Copy, PartialEq, Eq, Hash)]
pub enum SameSite { pub enum SameSite {
/// The "Strict" `SameSite` attribute. /// The "Strict" `SameSite` attribute.
Strict, Strict,
/// The "Lax" `SameSite` attribute. /// The "Lax" `SameSite` attribute.
Lax, Lax,
/// No `SameSite` attribute. /// The "None" `SameSite` attribute.
None, None,
} }
@ -92,7 +100,7 @@ impl fmt::Display for SameSite {
match *self { match *self {
SameSite::Strict => write!(f, "Strict"), SameSite::Strict => write!(f, "Strict"),
SameSite::Lax => write!(f, "Lax"), SameSite::Lax => write!(f, "Lax"),
SameSite::None => Ok(()), SameSite::None => write!(f, "None"),
} }
} }
} }

View File

@ -746,10 +746,8 @@ impl<'c> Cookie<'c> {
} }
if let Some(same_site) = self.same_site() { if let Some(same_site) = self.same_site() {
if !same_site.is_none() {
write!(f, "; SameSite={}", same_site)?; write!(f, "; SameSite={}", same_site)?;
} }
}
if let Some(path) = self.path() { if let Some(path) = self.path() {
write!(f, "; Path={}", path)?; write!(f, "; Path={}", path)?;
@ -1037,7 +1035,7 @@ mod tests {
let cookie = Cookie::build("foo", "bar") let cookie = Cookie::build("foo", "bar")
.same_site(SameSite::None) .same_site(SameSite::None)
.finish(); .finish();
assert_eq!(&cookie.to_string(), "foo=bar"); assert_eq!(&cookie.to_string(), "foo=bar; SameSite=None");
} }
#[test] #[test]