@@ -28,19 +28,19 @@ session data that is sent to the client, and verified when the session token is
2828
2929## ` akka-http-session ` features
3030
31- * type-safe client-side sessions
32- * sessions can be encrypted
33- * sessions contain an expiry date
34- * cookie or custom header transport
35- * support for [ JWT] ( http://jwt.io/ )
36- * refresh token support (e.g. to implement "remember me")
37- * CSRF tokens support
38- * Java & Scala APIs
31+ * type-safe client-side sessions
32+ * sessions can be encrypted
33+ * sessions contain an expiry date
34+ * cookie or custom header transport
35+ * support for [ JWT] ( http://jwt.io/ )
36+ * refresh token support (e.g. to implement "remember me")
37+ * CSRF tokens support
38+ * Java & Scala APIs
3939
4040## ` tapir-http-session ` features
4141
42- * all ` akka-http-session ` features
43- * [ tapir] ( https://tapir.softwaremill.com ) integration
42+ * all ` akka-http-session ` features
43+ * [ tapir] ( https://tapir.softwaremill.com ) integration
4444
4545## ` SessionManager ` & configuration
4646
@@ -65,9 +65,9 @@ recommended that all sites use `https` and all cookies have this attribute set.
6565
6666All session-related endpoints take at least two parameters:
6767
68- * session continuity: ` oneOff ` vs ` refreshable ` ; specifies what should happen when the session expires. If ` refreshable `
68+ * session continuity: ` oneOff ` vs ` refreshable ` ; specifies what should happen when the session expires. If ` refreshable `
6969and a refresh token is present, the session will be re-created. See below for details.
70- * session transport: ` usingCookies ` vs ` usingHeaders `
70+ * session transport: ` usingCookies ` vs ` usingHeaders `
7171
7272Typically, you would create aliases for the session-related endpoints which use the right parameters basing on the
7373current request and logic specific to your application.
@@ -132,10 +132,10 @@ or the [Play! docs](https://www.playframework.com/documentation/2.2.x/JavaCsrf)
132132
133133Web apps which use cookies for session management should be protected against CSRF attacks. This implementation:
134134
135- * assumes that ` GET ` requests are non-mutating (have no side effects)
136- * uses double-submit cookies to verify requests
137- * requires the token to be set in a custom header or (optionally) in a form field
138- * generates a new token on the first ` GET ` request that doesn't have the token cookie set
135+ * assumes that ` GET ` requests are non-mutating (have no side effects)
136+ * uses double-submit cookies to verify requests
137+ * requires the token to be set in a custom header or (optionally) in a form field
138+ * generates a new token on the first ` GET ` request that doesn't have the token cookie set
139139
140140Note that if the token is passed in a form field, the website isn't protected by HTTPS or you don't control all
141141subdomains, this scheme [ can be broken] ( http://security.stackexchange.com/questions/59470/double-submit-cookies-vulnerabilities/61039#61039 ) .
0 commit comments