Healsies
05/12/2021, 4:46 AMHealsies
05/12/2021, 4:49 AMrp
05/12/2021, 4:50 AMrp
05/12/2021, 4:55 AMHealsies
05/12/2021, 4:57 AMmichaelzhuk
05/12/2021, 5:00 AMmichaelzhuk
05/12/2021, 5:01 AMrp
05/12/2021, 5:02 AMnone
.rp
05/12/2021, 5:02 AMrp
05/12/2021, 5:03 AMmichaelzhuk
05/12/2021, 5:07 AMmichaelzhuk
05/12/2021, 5:08 AMmichaelzhuk
05/12/2021, 5:08 AMmichaelzhuk
05/12/2021, 5:09 AMmichaelzhuk
05/12/2021, 5:10 AMmichaelzhuk
05/12/2021, 5:13 AM"supertokens-auth-react": "supertokens/supertokens-auth-react#0.13",
"supertokens-node": "^5.0.1",
rp
05/12/2021, 5:16 AMantiCsrf
setting on the backend?rp
05/12/2021, 5:21 AMrp
05/12/2021, 6:44 AMsecure
flag. Please delete yarn.lock and run yarn upgrade
to get that change. Things should work now.
A note about session behaviour on safari: We are using antiCsrf VIA_TOKEN for CSRF protection. This is cause your CORS rules for APIs is probably set to allow any origin to query them (cause you are using an iframe) - if this is not true, then you can remove the antiCsrf
param from your backend config, and ignore this paragraph (in which case we will be using csrf protection via custom headers). If this is true, it means each request sends an anti-csrf token for CSRF protection. This token is store in frontend cookies. Now safari, caps the lifetime of frontend cookies to 7 days (privacy feature). So that means, if a user is using safari, and they don't refresh a session for 7 days, they will get logged out (only for safari). If this is an issue for you, you can set antiCsrf
to "NONE", and use another anti csrf method that involves injecting the CSRF token in the html (in conjunction to our lib).user
05/14/2021, 5:45 AMuser
05/14/2021, 5:47 AMrp
05/14/2021, 5:47 AMrp
05/14/2021, 5:51 AMrp
05/14/2021, 5:51 AMuser
05/14/2021, 5:57 AMrp
05/14/2021, 5:58 AMPaulbob
05/14/2021, 6:08 AMrp
05/14/2021, 6:09 AMrp
05/14/2021, 6:12 AMapp.use((err, req, res, next) => {...});
. Which will get the error that will explain what's wrong.Paulbob
05/14/2021, 6:14 AM