Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(auth): improve OIDC authentication reliability #67

Open
wants to merge 5 commits into
base: develop
Choose a base branch
from

Conversation

s0up4200
Copy link
Collaborator

@s0up4200 s0up4200 commented Nov 26, 2024

This PR addresses authentication issues to make OIDC login work reliably:

Token Expiry Handling:

  • Add default 24h expiry

#64

@s0up4200 s0up4200 added backend Backend architectural changes auth go labels Nov 26, 2024
Some OIDC providers (like PocketID) don't include token expiry times in their
responses. This causes authentication to fail as the session immediately expires.

- Add default 24h expiry when token.Expiry is zero
@s0up4200 s0up4200 changed the title fix(auth): exempt oauth callback from csrf protection fix(auth): improve OIDC authentication reliability Nov 27, 2024
@s0up4200 s0up4200 linked an issue Nov 27, 2024 that may be closed by this pull request
@jfroy
Copy link

jfroy commented Nov 28, 2024

Just tested the latest version of this PR and it works.

@s0up4200 s0up4200 requested a review from zze0s November 28, 2024 19:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auth backend Backend architectural changes go
Projects
None yet
Development

Successfully merging this pull request may close these issues.

oidc: Cross-site POST form submissions are forbidden
2 participants