diff --git a/admin/server/auth/handlers.go b/admin/server/auth/handlers.go index 33d986031dc..16f0a0121b5 100644 --- a/admin/server/auth/handlers.go +++ b/admin/server/auth/handlers.go @@ -29,6 +29,7 @@ const ( cookieFieldRedirect = "redirect" cookieFieldCustomDomainFlow = "custom_domain_flow" cookieFieldAccessToken = "access_token" + browserSessionTTL = 14 * 24 * time.Hour ) // RegisterEndpoints adds HTTP endpoints for auth. @@ -342,7 +343,8 @@ func (a *Authenticator) authLoginCallback(w http.ResponseWriter, r *http.Request } // Issue a new persistent auth token - authToken, err := a.admin.IssueUserAuthToken(r.Context(), user.ID, database.AuthClientIDRillWeb, "Browser session", nil, nil, false) + ttl := browserSessionTTL + authToken, err := a.admin.IssueUserAuthToken(r.Context(), user.ID, database.AuthClientIDRillWeb, "Browser session", nil, &ttl, false) if err != nil { http.Error(w, fmt.Sprintf("failed to issue API token: %s", err), http.StatusInternalServerError) return @@ -405,7 +407,8 @@ func (a *Authenticator) authLoginCustomDomainCallback(w http.ResponseWriter, r * http.Error(w, err.Error(), http.StatusUnauthorized) return } - newAuthToken, err := a.admin.IssueUserAuthToken(r.Context(), validated.OwnerID(), database.AuthClientIDRillWeb, "Browser session", nil, nil, false) + ttl := browserSessionTTL + newAuthToken, err := a.admin.IssueUserAuthToken(r.Context(), validated.OwnerID(), database.AuthClientIDRillWeb, "Browser session", nil, &ttl, false) if err != nil { http.Error(w, fmt.Sprintf("failed to issue API token: %s", err), http.StatusInternalServerError) return