happyDomain/internal
Pierre-Olivier Mercier d4970a109d fix: defer OIDC session key deletion until successful authentication
Previously the CSRF state, PKCE verifier, nonce, and next-path were
deleted and the session saved before the token exchange. A failure during
exchange or verification left the user with no way to retry without
restarting the whole flow.

Remove the intermediate session.Save(): the in-memory deletions are
discarded on any error so the session keys remain available for a retry.
On success, SessionLoginOK calls session.Clear() + Save() which atomically
consumes all keys. PKCE ensures the authorization code cannot be replayed
independently of the session.

Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
2026-03-12 15:03:56 +07:00
..
adapters Update to latest dnscontrol 2026-02-03 11:04:38 +08:00
api fix: defer OIDC session key deletion until successful authentication 2026-03-12 15:03:56 +07:00
api-admin fix: resolve go vet variable shadowing warnings 2026-03-01 17:37:59 +07:00
app Support configurable BasePath for hosting at a sub-path 2026-03-01 17:41:01 +07:00
avatar Clean architecture refactoring 2025-04-22 14:15:03 +02:00
captcha Add Altcha captcha provider support 2026-02-13 12:29:14 +07:00
config web: Integrate BasePath support into frontend and fix web route serving 2026-03-01 17:41:02 +07:00
forms chore: replace interface{} with any across the codebase 2026-03-01 17:38:04 +07:00
helpers chore: apply Go naming conventions and minor code improvements 2026-03-01 17:38:12 +07:00
mailer chore: apply Go naming conventions and minor code improvements 2026-03-01 17:38:12 +07:00
newsletter chore: apply Go naming conventions and minor code improvements 2026-03-01 17:38:12 +07:00
session security: 15-day session lifetime with 7-day auto-renewal 2026-03-12 15:03:56 +07:00
storage chore: apply Go naming conventions and minor code improvements 2026-03-01 17:38:12 +07:00
usecase security: 15-day session lifetime with 7-day auto-renewal 2026-03-12 15:03:56 +07:00