Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enforce https #495

Merged
merged 1 commit into from Aug 31, 2022
Merged

Enforce https #495

merged 1 commit into from Aug 31, 2022

Conversation

julien-nc
Copy link
Member

Performing the login flow with HTTP reveals/exposes secret information. Login and code endpoints are now rejecting HTTP requests.

OpenId specs regarding TLS are not very clear but can be interpreted as "better use HTTPS".

I took the opportunity to make some polishing to the Login controller. I hope this is not too out of scope 馃榿.

@julien-nc julien-nc added enhancement New feature or request security Pull requests that address a security vulnerability labels Aug 31, 2022
@juliushaertl
Copy link
Member

Can we disable the check in debug mode ? Otherwise local development becomes a bit harder

Copy link
Member

@juliushaertl juliushaertl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, now running integration tests in debug mode should also pass again :)

Signed-off-by: Julien Veyssier <eneiluj@posteo.net>
@julien-nc julien-nc merged commit 95daf74 into master Aug 31, 2022
@julien-nc julien-nc deleted the fix/noid/enforce-https branch August 31, 2022 16:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request security Pull requests that address a security vulnerability
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants