require_relative '../lib/chewy/strategy/custom_sidekiq'
require_relative '../lib/webpacker/manifest_extensions'
require_relative '../lib/webpacker/helper_extensions'
-require_relative '../lib/action_dispatch/cookie_jar_extensions'
require_relative '../lib/rails/engine_extensions'
require_relative '../lib/active_record/database_tasks_extensions'
require_relative '../lib/active_record/batches'
value: session_id,
expires: 1.year.from_now,
httponly: true,
- secure: (Rails.env.production? || ENV['LOCAL_HTTPS'] == 'true'),
same_site: :lax,
}
end
value: session_id,
expires: 1.year.from_now,
httponly: true,
- secure: (Rails.env.production? || ENV['LOCAL_HTTPS'] == 'true'),
same_site: :lax,
}
else
# Options to be passed to the created cookie. For instance, you can set
# secure: true in order to force SSL only cookies.
- config.rememberable_options = { secure: true }
+ config.rememberable_options = {}
# ==> Configuration for :validatable
# Range for password length.
Rails.application.config.session_store :cookie_store,
key: '_mastodon_session',
- secure: (Rails.env.production? || ENV['LOCAL_HTTPS'] == 'true'),
+ secure: false, # All cookies have their secure flag set by the force_ssl option in production
same_site: :lax
+++ /dev/null
-# frozen_string_literal: true
-
-module ActionDispatch
- module CookieJarExtensions
- private
-
- # Monkey-patch ActionDispatch to serve secure cookies to Tor Hidden Service
- # users. Otherwise, ActionDispatch would drop the cookie over HTTP.
- def write_cookie?(*)
- request.host.end_with?('.onion') || super
- end
- end
-end
-
-ActionDispatch::Cookies::CookieJar.prepend(ActionDispatch::CookieJarExtensions)
-
-module Rack
- module SessionPersistedExtensions
- def security_matches?(request, options)
- request.host.end_with?('.onion') || super
- end
- end
-end
-
-Rack::Session::Abstract::Persisted.prepend(Rack::SessionPersistedExtensions)