Remove deprecated CSRF check with 'rest' key

Created on 19 February 2023, almost 2 years ago
Updated 24 February 2023, almost 2 years ago

Problem/Motivation

Marked for removal in #2753681: Move CSRF header token out of REST module so that user module can use it, as well as any contrib module β†’ but never removed.

Steps to reproduce

n/a

Proposed resolution

Remove code.

Remaining tasks

Review.

User interface changes

None.

API changes

None not previously handled in original deprecation.

Data model changes

None.

Release notes snippet

n/a (?)

πŸ“Œ Task
Status

Needs work

Version

10.1 ✨

Component
RoutingΒ  β†’

Last updated 3 days ago

Created by

πŸ‡ΊπŸ‡ΈUnited States bradjones1 Digital Nomad Life

Live updates comments and jobs are added and updated live.
  • Needs framework manager review

    It is used to alert the framework manager core committer(s) that an issue significantly impacts (or has the potential to impact) multiple subsystems or represents a significant change or addition in architecture or public APIs, and their signoff is needed (see the governance policy draft for more information). If an issue significantly impacts only one subsystem, use Needs subsystem maintainer review instead, and make sure the issue component is set to the correct subsystem.

Sign in to follow issues

Comments & Activities

  • Issue created by @bradjones1
  • @bradjones1 opened merge request.
  • Status changed to Needs review almost 2 years ago
  • πŸ‡ΊπŸ‡ΈUnited States bradjones1 Digital Nomad Life
  • Status changed to Needs work almost 2 years ago
  • πŸ‡ΊπŸ‡ΈUnited States smustgrave

    Seems there were a number of failures.

  • Status changed to Needs review almost 2 years ago
  • πŸ‡ΊπŸ‡ΈUnited States bradjones1 Digital Nomad Life

    The login controller was still using the old token. I need help determining if this basically re-starts the clock on actually removing this b/c in theory you could break a login that is happening _during_ a site update? That doesn't particularly seem like a strong case to me because lots of changes can mean a really well-timed request might break during an update, if the site is not in maintenance mode.

  • πŸ‡ΊπŸ‡ΈUnited States bradjones1 Digital Nomad Life

    The discussion around this was at #2753681-33: Move CSRF header token out of REST module so that user module can use it, as well as any contrib module β†’ however it seems that without updating the login controller the cut-over didn't ever really happen as intended.

    Does this mean that we can only change the token used in the login controller now and have to wait for another two minor releases to come out, so the original is out of support?

  • Status changed to Needs work almost 2 years ago
  • πŸ‡ΊπŸ‡ΈUnited States smustgrave

    From what I can tell (sorry if I'm off) but this token is still in use or potentially in use? So think we would have to deprecate it to be removed in D11.

  • πŸ‡ΊπŸ‡ΈUnited States bradjones1 Digital Nomad Life

    From what I can tell (sorry if I'm off) but this token is still in use or potentially in use? So think we would have to deprecate it to be removed in D11.

    This is the sticky wicket. The initial change would have properly deprecated this if the token were changed at the same time as the BC layer were added. Except, the BC layer was added and the use of the deprecated token did not.

    So if we were to use the same deprecation procedure, then the BC layer stays, the token changes, and then in two minor releases (when the older one goes out of support) then the BC layer can be removed.

    There's part of me that feels like that's a bit much, but it's the only real way to do this to be completely by the book. It would be nice to get some sort of official ruling on this by a framework maintainer.

  • πŸ‡ΊπŸ‡ΈUnited States smustgrave

    Would agree with that.

Production build 0.71.5 2024