You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+3Lines changed: 3 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,9 @@ and this project adheres to [Semantic Versioning](https://semver.org/spec/v2.0.0
7
7
8
8
## [unreleased]
9
9
10
+
## [0.17.5] - 2024-03-14
11
+
- Adds a type uint64 to the `accessTokenCookiesExpiryDurationMillis` local variable in `recipe/session/utils.go`. It also removes the redundant `uint64` type forcing needed because of the untyped variable.
@@ -301,14 +301,14 @@ func SetAccessTokenInResponse(config sessmodels.TypeNormalisedInput, res http.Re
301
301
// This should be safe to do, since this is only the validity of the cookie (set here or on the frontend) but we check the expiration of the JWT anyway.
302
302
// Even if the token is expired the presence of the token indicates that the user could have a valid refresh
303
303
// Setting them to infinity would require special case handling on the frontend and just adding 100 years seems enough.
// We set the expiration to 100 years, because we can't really access the expiration of the refresh token everywhere we are setting it.
308
308
// This should be safe to do, since this is only the validity of the cookie (set here or on the frontend) but we check the expiration of the JWT anyway.
309
309
// Even if the token is expired the presence of the token indicates that the user could have a valid refresh
310
310
// Setting them to infinity would require special case handling on the frontend and just adding 100 years seems enough.
0 commit comments