Releases: maxcountryman/tower-sessions
v0.12.2
v0.12.1
What's Changed
Important Security Update
- Ensure ID cycling invokes
create
. #188
Because cycling the session ID involves creating a new ID, this must follow the same semantics as normal session creation. Therefore prior to this fix session ID collision could occur through this vector.
New Contributors
- @myOmikron made their first contribution in #187
Full Changelog: v0.12.0...v0.12.1
v0.12.0
What's Changed
Important Security Update
- Id collision mitigation. #181
This release introduces a new method, create
, to the SessionStore
trait to distinguish between creating a new session and updating an existing one. This distinction is crucial for mitigating the potential for session ID collisions.
Although the probability of session ID collisions is statistically low, given that IDs are composed of securely-random i128
values, such collisions pose a significant security risk. A store that does not differentiate between session creation and updates could inadvertently allow an existing session to be accessed, leading to potential session takeovers.
Session store authors are strongly encouraged to update and implement create
such that potential ID collisions are handled, either by generating a new ID or returning an error.
As a transitional measure, we have provided a default implementation of create
that wraps the existing save
method. However, this default is not immune to the original issue. Therefore, it is imperative that stores override the create
method with an implementation that adheres to the required uniqueness semantics, thereby effectively mitigating the risk of session ID collisions.
Thanks to @wt for discovering this issue and working through our design to address! 🙇
Full Changelog: v0.11.1...v0.12.0
v0.11.1
What's Changed
- Ensure
session.set_expiry
updates record. #175 - Provide
signed
andprivate
features, enabling signing and encryption respectively. #157
New Contributors
- @plasticbox made their first contribution in #167
- @daybowbow-dev made their first contribution in #168
- @wt made their first contribution in #170
Full Changelog: v0.11.0...v0.11.1
v0.11.0
What's Changed
- Uses slices when encoding and decoding
Id
. #159
Breaking Changes
- Removes
IdError
type in favor of usingbase64::DecodeSliceError
. #159 - Provides the same changes as 0.10.4, without breaking SemVer.
- Updates
base64
to0.22.0
.
New Contributors
Full Changelog: v0.10.4...v0.11.0
v0.10.4
What's Changed
- Revert introduction of lifetime parameter; use static lifetime directly
This ensures that the changes introduced in 0.10.3
do not break SemVer.
Please note that 0.10.3
has been yanked in accordance with cargo guidelines.
Full Changelog: v0.10.3...v0.10.4
v0.10.3
What's Changed
- Improve session config allocation footprint #158
New Contributors
Full Changelog: v0.10.2...v0.10.3
v0.10.2
What's Changed
- Ensure "Path" and "Domain" are set on removal cookie #154
Full Changelog: v0.10.1...v0.10.2
v0.10.1
v0.10.0
What's Changed
Breaking Changes
Session IDs are now represented as base64-encoded i128
s, boast 128 bits of entropy, and are shorter, saving network bandwidth and improving the secure nature of sessions.
We no longer bundle session stores via feature flags and as such applications must be updated to require the stores directly. For example, applications that use the tower-sessions-sqlx-store
should update their Cargo.toml
like so:
tower-sessions = "0.10.0"
tower-sessions-sqlx-store = { version = "0.10.0", features = ["sqlite"] }
Assuming a SQLite store, as an example.
Furthermore, imports will also need to be updated accordingly. For example:
use std::net::SocketAddr;
use axum::{response::IntoResponse, routing::get, Router};
use serde::{Deserialize, Serialize};
use time::Duration;
use tower_sessions::{session_store::ExpiredDeletion, Expiry, Session, SessionManagerLayer};
use tower_sessions_sqlx_store::{sqlx::SqlitePool, SqliteStore};
const COUNTER_KEY: &str = "counter";
#[derive(Serialize, Deserialize, Default)]
struct Counter(usize);
#[tokio::main]
async fn main() -> Result<(), Box<dyn std::error::Error>> {
let pool = SqlitePool::connect("sqlite::memory:").await?;
let session_store = SqliteStore::new(pool);
session_store.migrate().await?;
let deletion_task = tokio::task::spawn(
session_store
.clone()
.continuously_delete_expired(tokio::time::Duration::from_secs(60)),
);
let session_layer = SessionManagerLayer::new(session_store)
.with_secure(false)
.with_expiry(Expiry::OnInactivity(Duration::seconds(10)));
let app = Router::new().route("/", get(handler)).layer(session_layer);
let addr = SocketAddr::from(([127, 0, 0, 1], 3000));
let listener = tokio::net::TcpListener::bind(&addr).await?;
axum::serve(listener, app.into_make_service()).await?;
deletion_task.await??;
Ok(())
}
async fn handler(session: Session) -> impl IntoResponse {
let counter: Counter = session.get(COUNTER_KEY).await.unwrap().unwrap_or_default();
session.insert(COUNTER_KEY, counter.0 + 1).await.unwrap();
format!("Current count: {}", counter.0)
}
Finally, the service itself has been moved out of the core crate, which makes this crate smaller as well as establishes better boundaries between code.
Thank you for bearing with us: we are approaching longer term stability and aim to minimize churn going forward as we begin to move toward a 1.0 release.
New Contributors
- @bekriebel made their first contribution in #140
- @nul-reference made their first contribution in #141
Full Changelog: v0.9.1...v0.10.0