Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update session cookie expiration after OAuth #114

Merged
merged 1 commit into from
Nov 30, 2021

Conversation

paulomarg
Copy link
Contributor

@paulomarg paulomarg commented Nov 26, 2021

WHY are these changes introduced?

Fixes #112

Currently, after OAuth is completed, we're not updating the session cookie's expiration time to match the session, which means the session is lost after a minute.

WHAT is this pull request doing?

Making sure we're also updating the cookie on the callback method for OAuth.

Type of change

  • Patch: Bug (non-breaking change which fixes an issue)
  • Minor: New feature (non-breaking change which adds functionality)
  • Major: Breaking change (fix or feature that would cause existing functionality to not work as expected)

Checklist

  • I have added a changelog entry, prefixed by the type of change noted above
  • I have added/updated tests for this change
  • I have updated the documentation for public APIs from the library (if applicable)

@paulomarg paulomarg requested a review from a team November 26, 2021 19:39
@paulomarg paulomarg force-pushed the update_cookies_after_oauth branch from 1cc80fe to fc34330 Compare November 26, 2021 19:42
@paulomarg paulomarg force-pushed the update_cookies_after_oauth branch from fc34330 to d908392 Compare November 30, 2021 16:21
@paulomarg paulomarg merged commit 104d520 into main Nov 30, 2021
@paulomarg paulomarg deleted the update_cookies_after_oauth branch November 30, 2021 16:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Cookie duration for offline access token
2 participants