--
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
To view this discussion visit https://groups.google.com/a/chromium.org/d/msgid/net-dev/CAPTJ0XGGPL0TBQUo_Asrqak-cTax84Mb4-xeNKk2r2pZH%2BCckg%40mail.gmail.com.
Renderers can request any URLs they want, that includes .well-know URLs. I had assumed you wanted to have net/ check the path because the caller didn't have privileges to configure requests itself.If this isn't something we want renderers to do, then gating it on path doesn't make any sense - if we can't configure the URLLLoaderFactory/ResourceRequest to send lax cookies using current APIs (I'm not entirely clear on why we can't do that), then we should add a ResourceRequest::TrustedParam to do this, so that renderers can't use it.
Renderers can request any URLs they want, that includes .well-know URLs. I had assumed you wanted to have net/ check the path because the caller didn't have privileges to configure requests itself.If this isn't something we want renderers to do, then gating it on path doesn't make any sense - if we can't configure the URLLLoaderFactory/ResourceRequest to send lax cookies using current APIs (I'm not entirely clear on why we can't do that), then we should add a ResourceRequest::TrustedParam to do this, so that renderers can't use it.
Hello net-dev,(some context: https://github.com/w3c-fedid/FedCM/issues/587)I had a previous discussion in chrome-security-owp about sending SameSite=Lax cookies for FedCM requests (including POST requests), and that group was satisfied with making that change.Now I am looking at how to implement this and so I am asking this group for advice.At a high-level, what I want is "if request->destination() == WebIdentity(), include SameSite=Lax cookies (in addition to SameSite=None)" (but do not send SameSite=Strict)I believe this is the code to change:But how should I get this information to this place?I believe this is where the CookieOptions get created:
--
You received this message because you are subscribed to the Google Groups "net-dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email to net-dev+u...@chromium.org.
Hi Matt,Something like this? https://crrev.com/c/7017375I did notice there's already other force-cookie-related properties on URLRequest so I added this one nearby.
(There's also option 5, let the consumer (the FedCM code in content/browser/webid) set the force-allow-lax bit on ResourceRequest and pass it through, and validate that only the browser process can set it, but that's probably worse?)
On Thu, Oct 9, 2025 at 5:11 PM Christian Biesinger <cbies...@chromium.org> wrote:Hi Matt,Something like this? https://crrev.com/c/7017375I did notice there's already other force-cookie-related properties on URLRequest so I added this one nearby.Yes, exactly something like that. Should we consider clearing the bit on cross-origin redirects?
(There's also option 5, let the consumer (the FedCM code in content/browser/webid) set the force-allow-lax bit on ResourceRequest and pass it through, and validate that only the browser process can set it, but that's probably worse?)My experience has been that if you provide a public API, folks often start using it in ways that are probably not a great idea, so unless/until we discover a greater need for it, yea, I'd prefer not to add a bit to ResourceRequest. If we ever do, though, I'd prefer it to be on ResourceRequest::TrustedParams, so it's not renderer-exposed.