Go to file
jordi fita mas 917db31227 Add cross-request forgery detection
I use the ten first digits of the cookie’s hash, that i believe it is
not a problem, has the advantage of not expiring until the user logs
out, and using a per user session token is explicitly allowed by
OWASP[0].

[0]: https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#synchronizer-token-pattern
2023-02-02 11:39:34 +01:00
cmd/numerus Implement login cookie, its verification, and logout 2023-01-17 20:58:13 +01:00
debian Add required PostgreSQL extensions as dependencies for Debian 2023-01-24 23:59:28 +01:00
demo “Fix” the province for the demo’s company tax details 2023-02-01 14:32:46 +01:00
deploy Add cross-request forgery detection 2023-02-02 11:39:34 +01:00
pkg Add cross-request forgery detection 2023-02-02 11:39:34 +01:00
po Refactor form validation into a new type 2023-02-01 11:30:30 +01:00
revert Add the contact relation and a rough first form 2023-01-29 15:14:31 +01:00
test Add cross-request forgery detection 2023-02-02 11:39:34 +01:00
verify Add cross-request forgery detection 2023-02-02 11:39:34 +01:00
web Add cross-request forgery detection 2023-02-02 11:39:34 +01:00
.gitignore Ignore IntelliJ’s project files 2023-01-30 16:42:15 +01:00
COPYING Rename LICENSE to COPYING 2023-01-15 04:08:35 +01:00
Makefile Rename extension of templates to .gohtml 2023-01-30 16:48:21 +01:00
go.mod Add Catalan and Spanish translation with gotext[3] 2023-01-18 20:26:30 +01:00
go.sum Add Catalan and Spanish translation with gotext[3] 2023-01-18 20:26:30 +01:00
sqitch.conf Setup authentication schema and user relation 2023-01-13 20:30:21 +01:00
sqitch.plan Add the contact relation and a rough first form 2023-01-29 15:14:31 +01:00