summaryrefslogtreecommitdiff
AgeCommit message (Collapse)Author
2025-05-08chore: bundle envoy with sparklemo khan
2025-05-08chore: add envoy config and make targetsmo khan
2025-05-08chore: add a docker compose file to try envoymo khan
2025-05-08refactor: move html render to data transfer objectmo khan
2025-05-08feat: test out a redirect page in stagingmo khan
2025-05-08feat: use a cookie prefix to lock down the session cookiemo khan
> __Host-: If a cookie name has this prefix, it's accepted in a > Set-Cookie header only if it's also marked with the Secure attribute, > was sent from a secure origin, does not include a Domain attribute, > and has the Path attribute set to /. In other words, the cookie is > domain-locked. https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Cookies#cookie_prefixes
2025-05-08chore: add link to signed cookie issuemo khan
2025-05-08chore: add link to 404 issuemo khan
2025-05-08fix: temporarily disable signed cookies in staging/productionmo khan
2025-05-08chore: write cookie validity to logmo khan
2025-05-08feat: clear the oauth state cookie after usagemo khan
2025-05-08chore: log the generated cookiemo khan
2025-05-07feat: add a logomo khan
2025-05-07feat: add a favicon.icomo khan
2025-05-07feat: fallback to unsigned valuemo khan
2025-05-07refactor: use Mapper typemo khan
2025-05-07feat: check if cookie is validmo khan
2025-05-07fix: do not clear set-cookie headermo khan
2025-05-07fix: remove the csrf cookie after usagemo khan
2025-05-07chore: log the expiration of the access tokenmo khan
2025-05-07chore: log session cookie to understand why it is not being deliveredmo khan
2025-05-07fix: use same site lax mode to allow setting cooking on redirectmo khan
2025-05-07docs: remove outdated screenshotmo khan
2025-05-07refactor: provide context to repository to apply timeoutmo khan
2025-05-07feat: digitally sign and verify cookie using randomly generated keymo khan
2025-05-07refactor: move test server to oidc packagemo khan
2025-05-07refactor: extract helper to log errors consistentlymo khan
2025-05-07refactor: delegate to cookie packagemo khan
2025-05-07refactor: inline options variablemo khan
2025-05-07refactor: move cookie to web packagemo khan
2025-05-07refactor: delegate to cookie package to write to response streammo khan
2025-05-07refactor: delegate to cookie packagemo khan
2025-04-30fix: strict same site mode breaks redirectsmo khan
2025-04-30fix: adjust cookie expiration calculationmo khan
2025-04-30fix: revert change to error messagemo khan
2025-04-30test: add test for each cookie optionmo khan
2025-04-30refactor: delegate to cookie.Reset to overload with optionsmo khan
2025-04-30test: add test for resetting a cookiemo khan
2025-04-30test: ensure tests work offlinemo khan
2025-04-30refactor: delegate to x packagemo khan
2025-04-30refactor: using existing helpersmo khan
2025-04-30feat: extract other cookie optionsmo khan
2025-04-30fix: prepend default optionmo khan
2025-04-30refactor: extract generic function to create and initialize any typemo khan
2025-04-30refactor: extract Option[T] and cleaner API for creating cookiesmo khan
2025-04-30refactor: extract cookie optionsmo khan
2025-04-30fix: the CSRF cookie needs to have a same site lax modemo khan
2025-04-30fix: disable secure cookies in development modemo khan
2025-04-29feat: use same site strict modemo khan
> Strict causes the browser to only send the cookie in response to > requests originating from the cookie's origin site. This should be > used when you have cookies relating to functionality that will > always be behind an initial navigation, such as authentication or > storing shopping cart information. https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Cookies#controlling_third-party_cookies_with_samesite
2025-04-29Use secure and http flag on cookies everywheremo khan
> A cookie with the Secure attribute is only sent to the server with > an encrypted request over the HTTPS protocol. It's never sent with > unsecured HTTP (except on localhost), which means man-in-the-middle > attackers can't access it easily. Insecure sites (with http: in the > URL) can't set cookies with the Secure attribute. However, don't > assume that Secure prevents all access to sensitive information in > cookies. For example, someone with access to the client's hard disk > (or JavaScript if the HttpOnly attribute isn't set) can read and > modify the information. https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Cookies#block_access_to_your_cookies