mirror of
https://github.com/actix/actix-extras.git
synced 2024-11-30 10:32:55 +01:00
prepare actix-session release 0.6.1
This commit is contained in:
parent
449abd6081
commit
bf41b4cd9c
@ -3,6 +3,10 @@
|
|||||||
## Unreleased - 2021-xx-xx
|
## Unreleased - 2021-xx-xx
|
||||||
|
|
||||||
|
|
||||||
|
## 0.6.1 - 2022-03-21
|
||||||
|
- No significant changes since `0.6.0`.
|
||||||
|
|
||||||
|
|
||||||
## 0.6.0 - 2022-03-15
|
## 0.6.0 - 2022-03-15
|
||||||
### Added
|
### Added
|
||||||
- `SessionMiddleware`, a middleware to provide support for saving/updating/deleting session state against a pluggable storage backend (see `SessionStore` trait). [#212]
|
- `SessionMiddleware`, a middleware to provide support for saving/updating/deleting session state against a pluggable storage backend (see `SessionStore` trait). [#212]
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
[package]
|
[package]
|
||||||
name = "actix-session"
|
name = "actix-session"
|
||||||
version = "0.6.0"
|
version = "0.6.1"
|
||||||
authors = [
|
authors = [
|
||||||
"Nikolay Kim <fafhrd91@gmail.com>",
|
"Nikolay Kim <fafhrd91@gmail.com>",
|
||||||
"Luca Palmieri <rust@lpalmieri.com>",
|
"Luca Palmieri <rust@lpalmieri.com>",
|
||||||
|
@ -3,9 +3,9 @@
|
|||||||
> Session management for Actix Web applications.
|
> Session management for Actix Web applications.
|
||||||
|
|
||||||
[![crates.io](https://img.shields.io/crates/v/actix-session?label=latest)](https://crates.io/crates/actix-session)
|
[![crates.io](https://img.shields.io/crates/v/actix-session?label=latest)](https://crates.io/crates/actix-session)
|
||||||
[![Documentation](https://docs.rs/actix-session/badge.svg?version=0.6.0)](https://docs.rs/actix-session/0.6.0)
|
[![Documentation](https://docs.rs/actix-session/badge.svg?version=0.6.1)](https://docs.rs/actix-session/0.6.1)
|
||||||
![Apache 2.0 or MIT licensed](https://img.shields.io/crates/l/actix-session)
|
![Apache 2.0 or MIT licensed](https://img.shields.io/crates/l/actix-session)
|
||||||
[![Dependency Status](https://deps.rs/crate/actix-session/0.6.0/status.svg)](https://deps.rs/crate/actix-session/0.6.0)
|
[![Dependency Status](https://deps.rs/crate/actix-session/0.6.1/status.svg)](https://deps.rs/crate/actix-session/0.6.1)
|
||||||
|
|
||||||
|
|
||||||
## Documentation & Resources
|
## Documentation & Resources
|
||||||
|
@ -5,11 +5,11 @@
|
|||||||
//! influenced by the provided inputs (i.e. the request content) and whatever state the server
|
//! influenced by the provided inputs (i.e. the request content) and whatever state the server
|
||||||
//! queries while performing its processing.
|
//! queries while performing its processing.
|
||||||
//!
|
//!
|
||||||
//! Stateless systems are easier to reason about, but they are not quite as powerful as we need them to
|
//! Stateless systems are easier to reason about, but they are not quite as powerful as we need them
|
||||||
//! be - e.g. how do you authenticate a user? The user would be forced to authenticate **for every
|
//! to be - e.g. how do you authenticate a user? The user would be forced to authenticate **for
|
||||||
//! single request**. That is, for example, how 'Basic' Authentication works. While it may work for
|
//! every single request**. That is, for example, how 'Basic' Authentication works. While it may
|
||||||
//! a machine user (i.e. an API client), it is impractical for a person—you do not want a login
|
//! work for a machine user (i.e. an API client), it is impractical for a person—you do not want a
|
||||||
//! prompt on every single page you navigate to!
|
//! login prompt on every single page you navigate to!
|
||||||
//!
|
//!
|
||||||
//! There is a solution - **sessions**. Using sessions the server can attach state to a set of
|
//! There is a solution - **sessions**. Using sessions the server can attach state to a set of
|
||||||
//! requests coming from the same client. They are built on top of cookies - the server sets a
|
//! requests coming from the same client. They are built on top of cookies - the server sets a
|
||||||
|
@ -190,15 +190,14 @@ pub enum SessionLength {
|
|||||||
pub enum CookieContentSecurity {
|
pub enum CookieContentSecurity {
|
||||||
/// The cookie content is encrypted when using `CookieContentSecurity::Private`.
|
/// The cookie content is encrypted when using `CookieContentSecurity::Private`.
|
||||||
///
|
///
|
||||||
/// Encryption guarantees confidentiality and integrity: the client cannot
|
/// Encryption guarantees confidentiality and integrity: the client cannot tamper with the
|
||||||
/// tamper with the cookie content nor decode it, as long as the encryption key remains
|
/// cookie content nor decode it, as long as the encryption key remains confidential.
|
||||||
/// confidential.
|
|
||||||
Private,
|
Private,
|
||||||
|
|
||||||
/// The cookie content is signed when using `CookieContentSecurity::Signed`.
|
/// The cookie content is signed when using `CookieContentSecurity::Signed`.
|
||||||
///
|
///
|
||||||
/// Signing guarantees integrity, but it doesn't ensure confidentiality: the client
|
/// Signing guarantees integrity, but it doesn't ensure confidentiality: the client cannot
|
||||||
/// cannot tamper with the cookie content, but they can read it.
|
/// tamper with the cookie content, but they can read it.
|
||||||
Signed,
|
Signed,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user