forgejo/routers/web/auth
Gusted eff097448b
[GITEA] rework long-term authentication
- The current architecture is inherently insecure, because you can
construct the 'secret' cookie value with values that are available in
the database. Thus provides zero protection when a database is
dumped/leaked.
- This patch implements a new architecture that's inspired from: [Paragonie Initiative](https://paragonie.com/blog/2015/04/secure-authentication-php-with-long-term-persistence#secure-remember-me-cookies).
- Integration testing is added to ensure the new mechanism works.
- Removes a setting, because it's not used anymore.
2023-10-05 08:03:27 +02:00
..
2fa.go Another round of db.DefaultContext refactor (#27103) 2023-09-25 13:17:37 +00:00
auth.go [GITEA] rework long-term authentication 2023-10-05 08:03:27 +02:00
linkaccount.go Another round of db.DefaultContext refactor (#27103) 2023-09-25 13:17:37 +00:00
main_test.go make writing main test easier (#27270) 2023-09-28 01:38:53 +00:00
oauth.go [GITEA] rework long-term authentication 2023-10-05 08:03:27 +02:00
oauth_test.go Bump github.com/golang-jwt/jwt to v5 (#25975) 2023-07-19 09:57:10 +00:00
openid.go Reduce usage of db.DefaultContext (#27073) 2023-09-14 17:09:32 +00:00
password.go More refactoring of db.DefaultContext (#27083) 2023-09-15 06:13:19 +00:00
webauthn.go Another round of db.DefaultContext refactor (#27103) 2023-09-25 13:17:37 +00:00