You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

cookie.go 2.4KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576
  1. // Copyright 2020 The Macaron Authors
  2. // Copyright 2020 The Gitea Authors. All rights reserved.
  3. // SPDX-License-Identifier: MIT
  4. package middleware
  5. import (
  6. "net/http"
  7. "net/url"
  8. "strings"
  9. "code.gitea.io/gitea/modules/setting"
  10. )
  11. // SetRedirectToCookie convenience function to set the RedirectTo cookie consistently
  12. func SetRedirectToCookie(resp http.ResponseWriter, value string) {
  13. SetSiteCookie(resp, "redirect_to", value, 0)
  14. }
  15. // DeleteRedirectToCookie convenience function to delete most cookies consistently
  16. func DeleteRedirectToCookie(resp http.ResponseWriter) {
  17. SetSiteCookie(resp, "redirect_to", "", -1)
  18. }
  19. // GetSiteCookie returns given cookie value from request header.
  20. func GetSiteCookie(req *http.Request, name string) string {
  21. cookie, err := req.Cookie(name)
  22. if err != nil {
  23. return ""
  24. }
  25. val, _ := url.QueryUnescape(cookie.Value)
  26. return val
  27. }
  28. // SetSiteCookie returns given cookie value from request header.
  29. func SetSiteCookie(resp http.ResponseWriter, name, value string, maxAge int) {
  30. cookie := &http.Cookie{
  31. Name: name,
  32. Value: url.QueryEscape(value),
  33. MaxAge: maxAge,
  34. Path: setting.SessionConfig.CookiePath,
  35. Domain: setting.SessionConfig.Domain,
  36. Secure: setting.SessionConfig.Secure,
  37. HttpOnly: true,
  38. SameSite: setting.SessionConfig.SameSite,
  39. }
  40. resp.Header().Add("Set-Cookie", cookie.String())
  41. // Previous versions would use a cookie path with a trailing /.
  42. // These are more specific than cookies without a trailing /, so
  43. // we need to delete these if they exist.
  44. DeleteLegacySiteCookie(resp, name)
  45. }
  46. // DeleteLegacySiteCookie deletes the cookie with the given name at the cookie
  47. // path with a trailing /, which would unintentionally override the cookie.
  48. func DeleteLegacySiteCookie(resp http.ResponseWriter, name string) {
  49. if setting.SessionConfig.CookiePath == "" || strings.HasSuffix(setting.SessionConfig.CookiePath, "/") {
  50. // If the cookie path ends with /, no legacy cookies will take
  51. // precedence, so do nothing. The exception is that cookies with no
  52. // path could override other cookies, but it's complicated and we don't
  53. // currently handle that.
  54. return
  55. }
  56. cookie := &http.Cookie{
  57. Name: name,
  58. Value: "",
  59. MaxAge: -1,
  60. Path: setting.SessionConfig.CookiePath + "/",
  61. Domain: setting.SessionConfig.Domain,
  62. Secure: setting.SessionConfig.Secure,
  63. HttpOnly: true,
  64. SameSite: setting.SessionConfig.SameSite,
  65. }
  66. resp.Header().Add("Set-Cookie", cookie.String())
  67. }