Skip to content

Commit ddafd72

Browse files
committed
to fix list-item-indent
1 parent dc3721b commit ddafd72

File tree

1 file changed

+16
-16
lines changed

1 file changed

+16
-16
lines changed

README.md

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -28,19 +28,19 @@ session data that is sent to the client, and verified when the session token is
2828

2929
## `akka-http-session` features
3030

31-
* type-safe client-side sessions
32-
* sessions can be encrypted
33-
* sessions contain an expiry date
34-
* cookie or custom header transport
35-
* support for [JWT](http://jwt.io/)
36-
* refresh token support (e.g. to implement "remember me")
37-
* CSRF tokens support
38-
* Java & Scala APIs
31+
* type-safe client-side sessions
32+
* sessions can be encrypted
33+
* sessions contain an expiry date
34+
* cookie or custom header transport
35+
* support for [JWT](http://jwt.io/)
36+
* refresh token support (e.g. to implement "remember me")
37+
* CSRF tokens support
38+
* Java & Scala APIs
3939

4040
## `tapir-http-session` features
4141

42-
* all `akka-http-session` features
43-
* [tapir](https://tapir.softwaremill.com) integration
42+
* all `akka-http-session` features
43+
* [tapir](https://tapir.softwaremill.com) integration
4444

4545
## `SessionManager` & configuration
4646

@@ -65,9 +65,9 @@ recommended that all sites use `https` and all cookies have this attribute set.
6565

6666
All session-related endpoints take at least two parameters:
6767

68-
* session continuity: `oneOff` vs `refreshable`; specifies what should happen when the session expires. If `refreshable`
68+
* session continuity: `oneOff` vs `refreshable`; specifies what should happen when the session expires. If `refreshable`
6969
and a refresh token is present, the session will be re-created. See below for details.
70-
* session transport: `usingCookies` vs `usingHeaders`
70+
* session transport: `usingCookies` vs `usingHeaders`
7171

7272
Typically, you would create aliases for the session-related endpoints which use the right parameters basing on the
7373
current request and logic specific to your application.
@@ -132,10 +132,10 @@ or the [Play! docs](https://www.playframework.com/documentation/2.2.x/JavaCsrf)
132132

133133
Web apps which use cookies for session management should be protected against CSRF attacks. This implementation:
134134

135-
* assumes that `GET` requests are non-mutating (have no side effects)
136-
* uses double-submit cookies to verify requests
137-
* requires the token to be set in a custom header or (optionally) in a form field
138-
* generates a new token on the first `GET` request that doesn't have the token cookie set
135+
* assumes that `GET` requests are non-mutating (have no side effects)
136+
* uses double-submit cookies to verify requests
137+
* requires the token to be set in a custom header or (optionally) in a form field
138+
* generates a new token on the first `GET` request that doesn't have the token cookie set
139139

140140
Note that if the token is passed in a form field, the website isn't protected by HTTPS or you don't control all
141141
subdomains, this scheme [can be broken](http://security.stackexchange.com/questions/59470/double-submit-cookies-vulnerabilities/61039#61039).

0 commit comments

Comments
 (0)