You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 6, 2019. It is now read-only.
Cookie-based authentication is proving to be a bit cumbersome to work with (simply because CSRF must be taken into consideration every change)
Since the authentication value itself is already encrypted by vault's transit key, there should simply be an endpoint in which the frontend can use to login (provide a raw vault token, receive a transit encrypted cipher). This cipher can then be used as a header to each http request, and the backend can verify this value as normal.
* Minor text fix
* Frontend switched from cookie to token based authentication
* Removed csrf from frontend, since cookies are no longer used
* Removed csrf from backend
Cookie-based authentication is proving to be a bit cumbersome to work with (simply because CSRF must be taken into consideration every change)
Since the authentication value itself is already encrypted by vault's transit key, there should simply be an endpoint in which the frontend can use to login (provide a raw vault token, receive a transit encrypted cipher). This cipher can then be used as a header to each http request, and the backend can verify this value as normal.
No cookies, no CSRF => less worries.
Also, this is almost necessary for #104 to happen
The text was updated successfully, but these errors were encountered: