Skip to content

Releases: maxcountryman/tower-sessions

v0.13.0

03 Sep 16:55
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v0.12.3...v0.13.0

v0.12.3

15 Aug 22:38
c6ee4e1
Compare
Choose a tag to compare

What's Changed

  • Ensure continuously_delete_expired waits for initial run #208

New Contributors

Full Changelog: v0.12.2...v0.12.3

v0.12.2

14 Apr 16:26
Compare
Choose a tag to compare

What's Changed

New Contributors

Full Changelog: v0.12.1...v0.12.2

v0.12.1

31 Mar 23:31
Compare
Choose a tag to compare

What's Changed

Important Security Update

  • Ensure ID cycling invokes create. #188

Because cycling the session ID involves creating a new ID, this must follow the same semantics as normal session creation. Therefore prior to this fix session ID collision could occur through this vector.

New Contributors

Full Changelog: v0.12.0...v0.12.1

v0.12.0

19 Mar 21:08
Compare
Choose a tag to compare

What's Changed

Important Security Update

  • Id collision mitigation. #181

This release introduces a new method, create, to the SessionStore trait to distinguish between creating a new session and updating an existing one. This distinction is crucial for mitigating the potential for session ID collisions.

Although the probability of session ID collisions is statistically low, given that IDs are composed of securely-random i128 values, such collisions pose a significant security risk. A store that does not differentiate between session creation and updates could inadvertently allow an existing session to be accessed, leading to potential session takeovers.

Session store authors are strongly encouraged to update and implement create such that potential ID collisions are handled, either by generating a new ID or returning an error.

As a transitional measure, we have provided a default implementation of create that wraps the existing save method. However, this default is not immune to the original issue. Therefore, it is imperative that stores override the create method with an implementation that adheres to the required uniqueness semantics, thereby effectively mitigating the risk of session ID collisions.

Thanks to @wt for discovering this issue and working through our design to address! 🙇

Full Changelog: v0.11.1...v0.12.0

v0.11.1

17 Mar 15:50
Compare
Choose a tag to compare

What's Changed

  • Ensure session.set_expiry updates record. #175
  • Provide signed and private features, enabling signing and encryption respectively. #157

New Contributors

Full Changelog: v0.11.0...v0.11.1

v0.11.0

05 Mar 01:52
Compare
Choose a tag to compare

What's Changed

  • Uses slices when encoding and decoding Id. #159

Breaking Changes

  • Removes IdError type in favor of using base64::DecodeSliceError. #159
  • Provides the same changes as 0.10.4, without breaking SemVer.
  • Updates base64 to 0.22.0.

New Contributors

Full Changelog: v0.10.4...v0.11.0

v0.10.4

24 Feb 15:57
Compare
Choose a tag to compare

What's Changed

  • Revert introduction of lifetime parameter; use static lifetime directly

This ensures that the changes introduced in 0.10.3 do not break SemVer.

Please note that 0.10.3 has been yanked in accordance with cargo guidelines.

Full Changelog: v0.10.3...v0.10.4

v0.10.3

23 Feb 15:22
Compare
Choose a tag to compare

What's Changed

  • Improve session config allocation footprint #158

New Contributors

Full Changelog: v0.10.2...v0.10.3

v0.10.2

06 Feb 15:56
Compare
Choose a tag to compare

What's Changed

  • Ensure "Path" and "Domain" are set on removal cookie #154

Full Changelog: v0.10.1...v0.10.2