summaryrefslogtreecommitdiff
path: root/app/controllers/sessions/controller_test.go
AgeCommit message (Collapse)Author
2025-05-15refactor: delete code that is now handled by envoymo khan
2025-05-14refactor: remove unnecessary params from ctormo khan
2025-05-14feat: provider a fallback provider that defaults to hard-coded pathsmo khan
2025-05-11fix: redirect to dashboard when already logged in at callback urlmo khan
2025-05-11refactor: use same cookie names as envoy pluginmo khan
2025-05-11feat: add endpoint to reflect JWT bodymo khan
2025-05-08feat: test out a redirect page in stagingmo khan
2025-05-08feat: use a cookie prefix to lock down the session cookiemo khan
> __Host-: If a cookie name has this prefix, it's accepted in a > Set-Cookie header only if it's also marked with the Secure attribute, > was sent from a secure origin, does not include a Domain attribute, > and has the Path attribute set to /. In other words, the cookie is > domain-locked. https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Cookies#cookie_prefixes
2025-05-07fix: do not clear set-cookie headermo khan
2025-05-07fix: use same site lax mode to allow setting cooking on redirectmo khan
2025-05-07feat: digitally sign and verify cookie using randomly generated keymo khan
2025-05-07refactor: move test server to oidc packagemo khan
2025-05-07refactor: move cookie to web packagemo khan
2025-05-07refactor: delegate to cookie packagemo khan
2025-04-30fix: prepend default optionmo khan
2025-04-30refactor: extract Option[T] and cleaner API for creating cookiesmo khan
2025-04-29Use secure and http flag on cookies everywheremo khan
> A cookie with the Secure attribute is only sent to the server with > an encrypted request over the HTTPS protocol. It's never sent with > unsecured HTTP (except on localhost), which means man-in-the-middle > attackers can't access it easily. Insecure sites (with http: in the > URL) can't set cookies with the Secure attribute. However, don't > assume that Secure prevents all access to sensitive information in > cookies. For example, someone with access to the client's hard disk > (or JavaScript if the HttpOnly attribute isn't set) can read and > modify the information. https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Cookies#block_access_to_your_cookies
2025-04-28feat: validate the csrf tokenmo khan
2025-04-28feat: redirect to login page when session is establishedmo khan
2025-04-28feat: generate a nonce to validate the OAuth callbackmo khan
2025-04-28feat: add logout endpointmo khan
2025-04-25feat: print error to describe token exchange issuemo khan
2025-04-17test: validate the stored tokens in the session cookiemo khan
2025-04-17test: extract test helper to convert and verify raw id tokenmo khan
2025-04-17test: extract method to generate a valid authorization code grantmo khan
2025-04-17test: remove the test oidc servermo khan
2025-04-16refactor: verify the id token on every requestmo khan
2025-04-15feat: create session cookie tied to access tokenmo khan
2025-04-15feat: store tokens in sessio cookiemo khan
2025-04-15feat: store tokens in a session cookiemo khan
2025-04-14test: add placeholder for missing testsmo khan
2025-04-14feat: connect the sessions controller to oidc providermo khan
2025-04-14test: add target audience for oidc transactionmo khan
2025-04-14feat: start to build a session controller to interact with an oidc providermo khan