Use encrypted cookie sessions
This commit is contained in:
parent
a7b0352d3c
commit
d84a885fdb
9 changed files with 131 additions and 27 deletions
|
|
@ -63,6 +63,8 @@ Useful variables:
|
|||
|
||||
- `FORGEJO_BASE_URL=https://aksal.cloud`
|
||||
- `APP_BASE_URL=http://kacper-dev-pod:8800`
|
||||
- `AUTH_SECRET_KEY=...`
|
||||
- `AUTH_COOKIE_SECURE=false`
|
||||
- `FORGEJO_OAUTH_CLIENT_ID=...`
|
||||
- `FORGEJO_OAUTH_CLIENT_SECRET=...`
|
||||
- `FORGEJO_OAUTH_SCOPES=openid profile`
|
||||
|
|
@ -74,7 +76,7 @@ Useful variables:
|
|||
Notes:
|
||||
|
||||
- Browser sign-in uses Forgejo OAuth/OIDC. `APP_BASE_URL` must match the URL opened in the browser, and the Forgejo OAuth app must include `/api/auth/forgejo/callback` under that base URL.
|
||||
- Browser OAuth requests only identity scopes. The backend stores the resulting Forgejo token server-side and may use it only after enforcing public-repository checks.
|
||||
- Browser OAuth requests only identity scopes. The backend stores the resulting Forgejo token in an encrypted `HttpOnly` cookie and may use it only after enforcing public-repository checks.
|
||||
- `FORGEJO_TOKEN` is optional and should be treated as a read-only local fallback. Browser sessions and API token calls may write comments only after verifying the target repo is public.
|
||||
- API clients can query with `Authorization: token ...` or `Authorization: Bearer ...`.
|
||||
- `CALENDAR_FEED_URLS` is optional and accepts comma-separated `webcal://` or `https://` ICS feeds.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue