challenger

OAuth 2.0-based authentication service that validates user can receive messages at a certain address
Log | Files | Refs | Submodules | README | LICENSE

commit f7d861bed6851b42f42c8acbe7e49b93edaef7b7
parent 267cf549b10f668a2779d04800648aa42bcc22c2
Author: Christian Grothoff <christian@grothoff.org>
Date:   Sun, 22 Jun 2025 13:49:22 +0200

add 'Cache-control: no-store' by default (fixes #9723)

Diffstat:
Msrc/challenger/challenger-httpd_common.c | 6++++--
Msrc/challenger/challenger-httpd_solve.c | 3++-
Msrc/challenger/challenger-httpd_spa.c | 3++-
3 files changed, 8 insertions(+), 4 deletions(-)

diff --git a/src/challenger/challenger-httpd_common.c b/src/challenger/challenger-httpd_common.c @@ -212,7 +212,8 @@ TALER_MHD_redirect_with_oauth_status ( GNUNET_break (0); return MHD_NO; } - TALER_MHD_add_global_headers (response); + TALER_MHD_add_global_headers (response, + false); GNUNET_break (MHD_YES == MHD_add_response_header (response, MHD_HTTP_HEADER_CONTENT_TYPE, @@ -265,7 +266,8 @@ TALER_MHD_redirect_with_oauth_status ( oauth_error_uri))); response = TALER_MHD_make_json_steal (args); - TALER_MHD_add_global_headers (response); + TALER_MHD_add_global_headers (response, + false); http_status = MHD_HTTP_TOO_MANY_REQUESTS; } diff --git a/src/challenger/challenger-httpd_solve.c b/src/challenger/challenger-httpd_solve.c @@ -448,7 +448,8 @@ CH_handler_solve (struct CH_HandlerContext *hc, GNUNET_free (url); return MHD_NO; } - TALER_MHD_add_global_headers (response); + TALER_MHD_add_global_headers (response, + false); GNUNET_break (MHD_YES == MHD_add_response_header (response, MHD_HTTP_HEADER_CONTENT_TYPE, diff --git a/src/challenger/challenger-httpd_spa.c b/src/challenger/challenger-httpd_spa.c @@ -397,7 +397,8 @@ CH_spa_redirect (struct CH_HandlerContext *hc, GNUNET_break (0); return MHD_NO; } - TALER_MHD_add_global_headers (response); + TALER_MHD_add_global_headers (response, + true); GNUNET_break (MHD_YES == MHD_add_response_header (response, MHD_HTTP_HEADER_CONTENT_TYPE,