internal: use math.MaxInt for compatibility

Signed-off-by: Jens Langhammer <jens.langhammer@beryju.org>

#1819
This commit is contained in:
Jens Langhammer 2022-01-21 23:11:17 +01:00
parent 885efb526e
commit af3fb5c2cd

View file

@ -19,7 +19,7 @@ func (a *Application) getStore(p api.ProxyOutpostConfig) sessions.Store {
if err != nil { if err != nil {
panic(err) panic(err)
} }
rs.SetMaxLength(math.MaxInt64) rs.SetMaxLength(math.MaxInt)
if p.TokenValidity.IsSet() { if p.TokenValidity.IsSet() {
t := p.TokenValidity.Get() t := p.TokenValidity.Get()
// Add one to the validity to ensure we don't have a session with indefinite length // Add one to the validity to ensure we don't have a session with indefinite length
@ -39,7 +39,7 @@ func (a *Application) getStore(p api.ProxyOutpostConfig) sessions.Store {
// when using OpenID Connect , since this can contain a large amount of extra information in the id_token // when using OpenID Connect , since this can contain a large amount of extra information in the id_token
// Note, when using the FilesystemStore only the session.ID is written to a browser cookie, so this is explicit for the storage on disk // Note, when using the FilesystemStore only the session.ID is written to a browser cookie, so this is explicit for the storage on disk
cs.MaxLength(math.MaxInt64) cs.MaxLength(math.MaxInt)
if p.TokenValidity.IsSet() { if p.TokenValidity.IsSet() {
t := p.TokenValidity.Get() t := p.TokenValidity.Get()
// Add one to the validity to ensure we don't have a session with indefinite length // Add one to the validity to ensure we don't have a session with indefinite length