summaryrefslogtreecommitdiff
path: root/pkg/web/cookie/new.go
AgeCommit message (Collapse)Author
2025-05-07refactor: move cookie to web packagemo khan
2025-05-07refactor: delegate to cookie packagemo khan
2025-04-30fix: strict same site mode breaks redirectsmo khan
2025-04-30test: add test for each cookie optionmo khan
2025-04-30refactor: delegate to cookie.Reset to overload with optionsmo khan
2025-04-30refactor: delegate to x packagemo khan
2025-04-30refactor: using existing helpersmo khan
2025-04-30feat: extract other cookie optionsmo khan
2025-04-30fix: prepend default optionmo khan
2025-04-30refactor: extract generic function to create and initialize any typemo khan
2025-04-30refactor: extract Option[T] and cleaner API for creating cookiesmo khan
2025-04-30refactor: extract cookie optionsmo khan
2025-04-30fix: the CSRF cookie needs to have a same site lax modemo khan
2025-04-30fix: disable secure cookies in development modemo khan
2025-04-29feat: use same site strict modemo khan
> Strict causes the browser to only send the cookie in response to > requests originating from the cookie's origin site. This should be > used when you have cookies relating to functionality that will > always be behind an initial navigation, such as authentication or > storing shopping cart information. https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Cookies#controlling_third-party_cookies_with_samesite
2025-04-29Use secure and http flag on cookies everywheremo khan
> A cookie with the Secure attribute is only sent to the server with > an encrypted request over the HTTPS protocol. It's never sent with > unsecured HTTP (except on localhost), which means man-in-the-middle > attackers can't access it easily. Insecure sites (with http: in the > URL) can't set cookies with the Secure attribute. However, don't > assume that Secure prevents all access to sensitive information in > cookies. For example, someone with access to the client's hard disk > (or JavaScript if the HttpOnly attribute isn't set) can read and > modify the information. https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Cookies#block_access_to_your_cookies
2025-04-29feat: ensure cookie is not accessible to js and one transmitted over tls in ↵mo khan
production
2025-04-28test: temporarily disable http and secure flagsmo khan
2025-04-28feat: do not allow js to access cookiemo khan
2025-04-15feat: create session cookie tied to access tokenmo khan