You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+36-28Lines changed: 36 additions & 28 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,9 +28,9 @@ Consider as well to use the [crate unit tests](https://github.com/LeoniePhiline/
28
28
29
29
This middleware implements token transfer via [custom request headers](https://cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html#use-of-custom-request-headers).
30
30
31
-
The middleware requires and is built upon [`axum_sessions`](https://docs.rs/axum-sessions/), which in turn uses [`async_session`](https://docs.rs/async-session/).
31
+
The middleware requires and is built upon [`tower_sessions`](https://docs.rs/tower-sessions/).
32
32
33
-
The current version is built for and works with `axum 0.6.x`, `axum-sessions 0.5.x` and `async_session 3.x`.
33
+
The current version is built for and works with `axum 0.6.x`, `tower-sessions 0.4.x`.
34
34
35
35
There will be support for `axum 0.7` and later versions.
36
36
@@ -67,7 +67,7 @@ See ["Our RNGs"](https://rust-random.github.io/book/guide-rngs.html#cryptographi
67
67
68
68
The security of the underlying session is paramount - the CSRF prevention methods applied can only be as secure as the session carrying the server-side token.
69
69
70
-
- When creating your [SessionLayer](https://docs.rs/axum-sessions/latest/axum_sessions/struct.SessionLayer.html), make sure to use at least 64 bytes of cryptographically secure randomness.
70
+
- When creating your [SessionManagerLayer](https://docs.rs/tower-sessions/latest/tower_sessions/struct.SessionManagerLayer.html)
71
71
- Do not lower the secure defaults: Keep the session cookie's `secure` flag **on**.
72
72
- Use the strictest possible same-site policy.
73
73
@@ -105,16 +105,15 @@ Configure your session and CSRF protection layer in your backend application:
0 commit comments