-
Notifications
You must be signed in to change notification settings - Fork 6
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: The client is now a bit more secure against attacks and authent…
…ication token (JWT) stealing. For this, the JWT is now transferred and processed in HTTP-only cookies. In this context, XSRF protection with XSRF-TOKEN cookies has also been enabled. Beside the `security.jwt.sharedSecret` the following values are configurable now: - `security.jwt.expirationTime` (expiration time of the JWT) - `security.jwt.cookieName` (name of the HTTP-Only cookie) - `security.jwt.setSecure` (the boolean value for the cookie parameter `Secure` ) - `security.jwt.same-site` (`Strict` or `Lax` as value for the cookie parameter `SameSite`) FE: Mock authentication flow and user role definition without using a token in the request header (mockAPIServer). We have tried to fix CORS errors with the e2e tests, however there are still issues that need to be investigated and fixed later: - Changes NGINX template to avoid network errors - makes sameSite parameter of the cookies configurable Co-authored-by: andreas.kausler <[email protected]> PR #802
- Loading branch information
1 parent
863a24c
commit ae25da8
Showing
24 changed files
with
356 additions
and
139 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2 changes: 2 additions & 0 deletions
2
iris-client-bff/src/main/resources/application-dev_auth.properties
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,5 @@ | ||
security.auth=db | ||
security.auth.db.admin-user-name=admin | ||
security.auth.db.admin-user-password=admin | ||
|
||
security.jwt.set-secure=false |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.