mirror of
https://github.com/TriliumNext/Notes.git
synced 2025-09-20 02:51:40 +08:00
Merge pull request #961 from pano9000/fix-csrf-settings
fix(csrf): set more secure csrf related settings
This commit is contained in:
commit
b2e1a3e97a
@ -6,8 +6,8 @@ const doubleCsrfUtilities = doubleCsrf({
|
|||||||
cookieOptions: {
|
cookieOptions: {
|
||||||
path: "", // empty, so cookie is valid only for the current path
|
path: "", // empty, so cookie is valid only for the current path
|
||||||
secure: false,
|
secure: false,
|
||||||
sameSite: false,
|
sameSite: "strict",
|
||||||
httpOnly: false
|
httpOnly: true
|
||||||
},
|
},
|
||||||
cookieName: "_csrf"
|
cookieName: "_csrf"
|
||||||
});
|
});
|
||||||
|
@ -24,7 +24,7 @@ function index(req: Request, res: Response) {
|
|||||||
//'overwrite' set to false (default) => the existing token will be re-used and validated
|
//'overwrite' set to false (default) => the existing token will be re-used and validated
|
||||||
//'validateOnReuse' set to false => if validation fails, generate a new token instead of throwing an error
|
//'validateOnReuse' set to false => if validation fails, generate a new token instead of throwing an error
|
||||||
const csrfToken = generateCsrfToken(req, res, false, false);
|
const csrfToken = generateCsrfToken(req, res, false, false);
|
||||||
log.info(`Generated CSRF token ${csrfToken} with secret ${res.getHeader("set-cookie")}`);
|
log.info(`CSRF token generation: ${csrfToken ? "Successful" : "Failed"}`);
|
||||||
|
|
||||||
// We force the page to not be cached since on mobile the CSRF token can be
|
// We force the page to not be cached since on mobile the CSRF token can be
|
||||||
// broken when closing the browser and coming back in to the page.
|
// broken when closing the browser and coming back in to the page.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user