Skip to content

Commit 9305545

Browse files
committed
update more information on secure and httpOnly attributes
1 parent 462e832 commit 9305545

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

docs/proposals/session-persistence.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -142,7 +142,7 @@ Users can configure [sessionPersistence](https://gateway-api.sigs.k8s.io/referen
142142
| no matching spec field | `secure` | Enabled by default for all routes. |
143143
| no matching spec field | `httpOnly` | Enabled by default for all routes. |
144144

145-
145+
Note: The default `secure` and `httpOnly` settings may change in the future if we need to align with the Gateway API specification.
146146

147147
#### Domain and Path selection for Routes
148148

@@ -175,7 +175,9 @@ There are no existing conformance tests for session persistence, so we will add
175175

176176
## Security Considerations
177177

178-
The main security concern is scoping of session cookies. This design keeps cookies host-only by never setting the domain attribute, and for HTTPRoutes it scopes cookies by route path (or `/` when no safe common prefix exists). That limits both cross-host and cross-path leakage and reduces the impact of a compromised cookie.
178+
The main security concern is how far session cookies reach. This design keeps cookies host-only by never setting the domain attribute, and for HTTPRoutes it scopes cookies by route path (or `/` when no safe common prefix exists). That limits both cross-host and cross-path leakage and reduces the impact of a compromised cookie.
179+
180+
We also set `secure` and `httponly` on the session cookie by default as a hardening measure. If Gateway API later adds these as fields with different defaults, we’ll treat any change in behavior as an experimental-API breaking change. This will be documented in the Session Persistence guide, and upgrade guidance will be provided so users can explicitly configure these cookie attributes.
179181

180182
### Edge Cases
181183

0 commit comments

Comments
 (0)