Signed-off-by: Tamal Saha <tamal@appscode.com>tags/v1.10.0-rc1
DISABLE_GIT_HOOKS = false | DISABLE_GIT_HOOKS = false | ||||
; Password Hash algorithm, either "pbkdf2", "argon2", "scrypt" or "bcrypt" | ; Password Hash algorithm, either "pbkdf2", "argon2", "scrypt" or "bcrypt" | ||||
PASSWORD_HASH_ALGO = pbkdf2 | PASSWORD_HASH_ALGO = pbkdf2 | ||||
; Set false to allow JavaScript to read CSRF cookie | |||||
CSRF_COOKIE_HTTP_ONLY = true | |||||
[openid] | [openid] | ||||
; | ; |
- `INTERNAL_TOKEN`: **\<random at every install if no uri set\>**: Secret used to validate communication within Gitea binary. | - `INTERNAL_TOKEN`: **\<random at every install if no uri set\>**: Secret used to validate communication within Gitea binary. | ||||
- `INTERNAL_TOKEN_URI`: **<empty>**: Instead of defining internal token in the configuration, this configuration option can be used to give Gitea a path to a file that contains the internal token (example value: `file:/etc/gitea/internal_token`) | - `INTERNAL_TOKEN_URI`: **<empty>**: Instead of defining internal token in the configuration, this configuration option can be used to give Gitea a path to a file that contains the internal token (example value: `file:/etc/gitea/internal_token`) | ||||
- `PASSWORD_HASH_ALGO`: **pbkdf2**: The hash algorithm to use \[pbkdf2, argon2, scrypt, bcrypt\]. | - `PASSWORD_HASH_ALGO`: **pbkdf2**: The hash algorithm to use \[pbkdf2, argon2, scrypt, bcrypt\]. | ||||
- `CSRF_COOKIE_HTTP_ONLY`: **true**: Set false to allow JavaScript to read CSRF cookie. | |||||
## OpenID (`openid`) | ## OpenID (`openid`) | ||||
github.com/go-macaron/cache v0.0.0-20151013081102-561735312776 | github.com/go-macaron/cache v0.0.0-20151013081102-561735312776 | ||||
github.com/go-macaron/captcha v0.0.0-20190710000913-8dc5911259df | github.com/go-macaron/captcha v0.0.0-20190710000913-8dc5911259df | ||||
github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9 | github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9 | ||||
github.com/go-macaron/csrf v0.0.0-20180426211211-503617c6b372 | |||||
github.com/go-macaron/i18n v0.0.0-20160612092837-ef57533c3b0f | |||||
github.com/go-macaron/csrf v0.0.0-20190131233648-3751b136073c | |||||
github.com/go-macaron/i18n v0.0.0-20190131234336-56731837a73b | |||||
github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191 | github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191 | ||||
github.com/go-macaron/session v0.0.0-20190131233854-0a0a789bf193 | github.com/go-macaron/session v0.0.0-20190131233854-0a0a789bf193 | ||||
github.com/go-macaron/toolbox v0.0.0-20180818072302-a77f45a7ce90 | github.com/go-macaron/toolbox v0.0.0-20180818072302-a77f45a7ce90 |
github.com/go-macaron/captcha v0.0.0-20190710000913-8dc5911259df/go.mod h1:j9TJ+0nwUOWBvNnm0bheHIPFf3cC62EQo7n7O6PbjZA= | github.com/go-macaron/captcha v0.0.0-20190710000913-8dc5911259df/go.mod h1:j9TJ+0nwUOWBvNnm0bheHIPFf3cC62EQo7n7O6PbjZA= | ||||
github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9 h1:A0QGzY6UHHEil0I2e7C21JenNNG0mmrj5d9SFWTlgr8= | github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9 h1:A0QGzY6UHHEil0I2e7C21JenNNG0mmrj5d9SFWTlgr8= | ||||
github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9/go.mod h1:utmMRnVIrXPSfA9MFcpIYKEpKawjKxf62vv62k4707E= | github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9/go.mod h1:utmMRnVIrXPSfA9MFcpIYKEpKawjKxf62vv62k4707E= | ||||
github.com/go-macaron/csrf v0.0.0-20180426211211-503617c6b372 h1:acrx8CnDmlKl+BPoOOLEK9Ko+SrWFB5pxRuGkKj4iqo= | |||||
github.com/go-macaron/csrf v0.0.0-20180426211211-503617c6b372/go.mod h1:oZGMxI7MBnicI0jJqJvH4qQzyrWKhtiKxLSJKHC+ydc= | |||||
github.com/go-macaron/i18n v0.0.0-20160612092837-ef57533c3b0f h1:wDKrZFc9pYJlqFOf7EzGbFMrSFFtyHt3plr2uTdo8Rg= | |||||
github.com/go-macaron/i18n v0.0.0-20160612092837-ef57533c3b0f/go.mod h1:MePM/dStkAh+PNzAdNSNl4SGDM2EZvZGken+KpJhM7s= | |||||
github.com/go-macaron/csrf v0.0.0-20190131233648-3751b136073c h1:yCyrJuFaxKX/VoV9hHqYXhkFEMtg+Hxsiitk1z/lHfQ= | |||||
github.com/go-macaron/csrf v0.0.0-20190131233648-3751b136073c/go.mod h1:oZGMxI7MBnicI0jJqJvH4qQzyrWKhtiKxLSJKHC+ydc= | |||||
github.com/go-macaron/i18n v0.0.0-20190131234336-56731837a73b h1:p19t0uFyv0zkBwp4dafzU3EcpHilHNffTVDmxpn/M+w= | |||||
github.com/go-macaron/i18n v0.0.0-20190131234336-56731837a73b/go.mod h1:MePM/dStkAh+PNzAdNSNl4SGDM2EZvZGken+KpJhM7s= | |||||
github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191 h1:NjHlg70DuOkcAMqgt0+XA+NHwtu66MkTVVgR4fFWbcI= | github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191 h1:NjHlg70DuOkcAMqgt0+XA+NHwtu66MkTVVgR4fFWbcI= | ||||
github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191/go.mod h1:VFI2o2q9kYsC4o7VP1HrEVosiZZTd+MVT3YZx4gqvJw= | github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191/go.mod h1:VFI2o2q9kYsC4o7VP1HrEVosiZZTd+MVT3YZx4gqvJw= | ||||
github.com/go-macaron/session v0.0.0-20190131233854-0a0a789bf193 h1:z/nqwd+ql/r6Q3QGnwNd6B89UjPytM0be5pDQV9TuWw= | github.com/go-macaron/session v0.0.0-20190131233854-0a0a789bf193 h1:z/nqwd+ql/r6Q3QGnwNd6B89UjPytM0be5pDQV9TuWw= |
SessionConfig.Secure = Cfg.Section("session").Key("COOKIE_SECURE").MustBool(false) | SessionConfig.Secure = Cfg.Section("session").Key("COOKIE_SECURE").MustBool(false) | ||||
SessionConfig.Gclifetime = Cfg.Section("session").Key("GC_INTERVAL_TIME").MustInt64(86400) | SessionConfig.Gclifetime = Cfg.Section("session").Key("GC_INTERVAL_TIME").MustInt64(86400) | ||||
SessionConfig.Maxlifetime = Cfg.Section("session").Key("SESSION_LIFE_TIME").MustInt64(86400) | SessionConfig.Maxlifetime = Cfg.Section("session").Key("SESSION_LIFE_TIME").MustInt64(86400) | ||||
SessionConfig.Domain = Cfg.Section("session").Key("DOMAIN").String() | |||||
shadowConfig, err := json.Marshal(SessionConfig) | shadowConfig, err := json.Marshal(SessionConfig) | ||||
if err != nil { | if err != nil { |
// Time settings | // Time settings | ||||
TimeFormat string | TimeFormat string | ||||
CSRFCookieName = "_csrf" | |||||
CSRFCookieName = "_csrf" | |||||
CSRFCookieHTTPOnly = true | |||||
// Mirror settings | // Mirror settings | ||||
Mirror struct { | Mirror struct { | ||||
ImportLocalPaths = sec.Key("IMPORT_LOCAL_PATHS").MustBool(false) | ImportLocalPaths = sec.Key("IMPORT_LOCAL_PATHS").MustBool(false) | ||||
DisableGitHooks = sec.Key("DISABLE_GIT_HOOKS").MustBool(false) | DisableGitHooks = sec.Key("DISABLE_GIT_HOOKS").MustBool(false) | ||||
PasswordHashAlgo = sec.Key("PASSWORD_HASH_ALGO").MustString("pbkdf2") | PasswordHashAlgo = sec.Key("PASSWORD_HASH_ALGO").MustString("pbkdf2") | ||||
CSRFCookieHTTPOnly = sec.Key("CSRF_COOKIE_HTTP_ONLY").MustBool(true) | |||||
InternalToken = loadInternalToken(sec) | InternalToken = loadInternalToken(sec) | ||||
IterateBufferSize = Cfg.Section("database").Key("ITERATE_BUFFER_SIZE").MustInt(50) | IterateBufferSize = Cfg.Section("database").Key("ITERATE_BUFFER_SIZE").MustInt(50) | ||||
LogSQL = Cfg.Section("database").Key("LOG_SQL").MustBool(true) | LogSQL = Cfg.Section("database").Key("LOG_SQL").MustBool(true) |
} | } | ||||
m.Use(i18n.I18n(i18n.Options{ | m.Use(i18n.I18n(i18n.Options{ | ||||
SubURL: setting.AppSubURL, | |||||
Files: localFiles, | |||||
Langs: setting.Langs, | |||||
Names: setting.Names, | |||||
DefaultLang: "en-US", | |||||
Redirect: false, | |||||
SubURL: setting.AppSubURL, | |||||
Files: localFiles, | |||||
Langs: setting.Langs, | |||||
Names: setting.Names, | |||||
DefaultLang: "en-US", | |||||
Redirect: false, | |||||
CookieDomain: setting.SessionConfig.Domain, | |||||
})) | })) | ||||
m.Use(cache.Cacher(cache.Options{ | m.Use(cache.Cacher(cache.Options{ | ||||
Adapter: setting.CacheService.Adapter, | Adapter: setting.CacheService.Adapter, | ||||
Cookie: setting.CSRFCookieName, | Cookie: setting.CSRFCookieName, | ||||
SetCookie: true, | SetCookie: true, | ||||
Secure: setting.SessionConfig.Secure, | Secure: setting.SessionConfig.Secure, | ||||
CookieHttpOnly: true, | |||||
CookieHttpOnly: setting.CSRFCookieHTTPOnly, | |||||
Header: "X-Csrf-Token", | Header: "X-Csrf-Token", | ||||
CookieDomain: setting.SessionConfig.Domain, | |||||
CookiePath: setting.AppSubURL, | CookiePath: setting.AppSubURL, | ||||
})) | })) | ||||
m.Use(toolbox.Toolboxer(m, toolbox.Options{ | m.Use(toolbox.Toolboxer(m, toolbox.Options{ |
defer func() { | defer func() { | ||||
if !isSucceed { | if !isSucceed { | ||||
log.Trace("auto-login cookie cleared: %s", uname) | log.Trace("auto-login cookie cleared: %s", uname) | ||||
ctx.SetCookie(setting.CookieUserName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CookieUserName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
} | } | ||||
}() | }() | ||||
if err != nil { | if err != nil { | ||||
return false, err | return false, err | ||||
} | } | ||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
return true, nil | return true, nil | ||||
} | } | ||||
func handleSignInFull(ctx *context.Context, u *models.User, remember bool, obeyRedirect bool) string { | func handleSignInFull(ctx *context.Context, u *models.User, remember bool, obeyRedirect bool) string { | ||||
if remember { | if remember { | ||||
days := 86400 * setting.LogInRememberDays | days := 86400 * setting.LogInRememberDays | ||||
ctx.SetCookie(setting.CookieUserName, u.Name, days, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CookieUserName, u.Name, days, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
ctx.SetSuperSecureCookie(base.EncodeMD5(u.Rands+u.Passwd), | ctx.SetSuperSecureCookie(base.EncodeMD5(u.Rands+u.Passwd), | ||||
setting.CookieRememberName, u.Name, days, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
setting.CookieRememberName, u.Name, days, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
} | } | ||||
_ = ctx.Session.Delete("openid_verified_uri") | _ = ctx.Session.Delete("openid_verified_uri") | ||||
} | } | ||||
} | } | ||||
ctx.SetCookie("lang", u.Language, nil, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie("lang", u.Language, nil, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
// Clear whatever CSRF has right now, force to generate a new one | // Clear whatever CSRF has right now, force to generate a new one | ||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
// Register last login | // Register last login | ||||
u.SetLastLogin() | u.SetLastLogin() | ||||
} | } | ||||
// Clear whatever CSRF has right now, force to generate a new one | // Clear whatever CSRF has right now, force to generate a new one | ||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
// Register last login | // Register last login | ||||
u.SetLastLogin() | u.SetLastLogin() | ||||
_ = ctx.Session.Delete("socialId") | _ = ctx.Session.Delete("socialId") | ||||
_ = ctx.Session.Delete("socialName") | _ = ctx.Session.Delete("socialName") | ||||
_ = ctx.Session.Delete("socialEmail") | _ = ctx.Session.Delete("socialEmail") | ||||
ctx.SetCookie(setting.CookieUserName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie("lang", "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) // Setting the lang cookie will trigger the middleware to reset the language ot previous state. | |||||
ctx.SetCookie(setting.CookieUserName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie("lang", "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) // Setting the lang cookie will trigger the middleware to reset the language ot previous state. | |||||
} | } | ||||
// SignOut sign out from login status | // SignOut sign out from login status |
} | } | ||||
// Update the language to the one we just set | // Update the language to the one we just set | ||||
ctx.SetCookie("lang", ctx.User.Language, nil, setting.AppSubURL, "", setting.SessionConfig.Secure, true) | |||||
ctx.SetCookie("lang", ctx.User.Language, nil, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) | |||||
log.Trace("User settings updated: %s", ctx.User.Name) | log.Trace("User settings updated: %s", ctx.User.Name) | ||||
ctx.Flash.Success(i18n.Tr(ctx.User.Language, "settings.update_profile_success")) | ctx.Flash.Success(i18n.Tr(ctx.User.Language, "settings.update_profile_success")) |
sudo: false | sudo: false | ||||
language: go | language: go | ||||
go: | go: | ||||
- 1.5.x | |||||
- 1.6.x | - 1.6.x | ||||
- 1.7.x | - 1.7.x | ||||
- 1.8.x | - 1.8.x |
"gopkg.in/macaron.v1" | "gopkg.in/macaron.v1" | ||||
) | ) | ||||
const _VERSION = "0.1.0" | |||||
const _VERSION = "0.1.1" | |||||
func Version() string { | func Version() string { | ||||
return _VERSION | return _VERSION | ||||
Form string | Form string | ||||
// Cookie name value for setting and getting csrf token. | // Cookie name value for setting and getting csrf token. | ||||
Cookie string | Cookie string | ||||
//Cookie domain | |||||
CookieDomain string | |||||
//Cookie path | //Cookie path | ||||
CookiePath string | CookiePath string | ||||
// Cookie HttpOnly flag value used for the csrf token. | // Cookie HttpOnly flag value used for the csrf token. | ||||
Form string | Form string | ||||
// Cookie value used to set and get token. | // Cookie value used to set and get token. | ||||
Cookie string | Cookie string | ||||
// Cookie domain. | |||||
CookieDomain string | |||||
// Cookie path. | // Cookie path. | ||||
CookiePath string | |||||
CookiePath string | |||||
CookieHttpOnly bool | CookieHttpOnly bool | ||||
// Key used for getting the unique ID per user. | // Key used for getting the unique ID per user. | ||||
SessionKey string | SessionKey string | ||||
Header: opt.Header, | Header: opt.Header, | ||||
Form: opt.Form, | Form: opt.Form, | ||||
Cookie: opt.Cookie, | Cookie: opt.Cookie, | ||||
CookieDomain: opt.CookieDomain, | |||||
CookiePath: opt.CookiePath, | CookiePath: opt.CookiePath, | ||||
CookieHttpOnly: opt.CookieHttpOnly, | CookieHttpOnly: opt.CookieHttpOnly, | ||||
ErrorFunc: opt.ErrorFunc, | ErrorFunc: opt.ErrorFunc, | ||||
// FIXME: actionId. | // FIXME: actionId. | ||||
x.Token = GenerateToken(x.Secret, x.ID, "POST") | x.Token = GenerateToken(x.Secret, x.ID, "POST") | ||||
if opt.SetCookie { | if opt.SetCookie { | ||||
ctx.SetCookie(opt.Cookie, x.Token, 0, opt.CookiePath, "", opt.Secure, opt.CookieHttpOnly, time.Now().AddDate(0, 0, 1)) | |||||
ctx.SetCookie(opt.Cookie, x.Token, 0, opt.CookiePath, opt.CookieDomain, opt.Secure, opt.CookieHttpOnly, time.Now().AddDate(0, 0, 1)) | |||||
} | } | ||||
} | } | ||||
h := hmac.New(sha1.New, []byte(key)) | h := hmac.New(sha1.New, []byte(key)) | ||||
fmt.Fprintf(h, "%s:%s:%d", clean(userID), clean(actionID), now.UnixNano()) | fmt.Fprintf(h, "%s:%s:%d", clean(userID), clean(actionID), now.UnixNano()) | ||||
tok := fmt.Sprintf("%s:%d", h.Sum(nil), now.UnixNano()) | tok := fmt.Sprintf("%s:%d", h.Sum(nil), now.UnixNano()) | ||||
return base64.URLEncoding.EncodeToString([]byte(tok)) | |||||
return base64.RawURLEncoding.EncodeToString([]byte(tok)) | |||||
} | } | ||||
// Valid returns true if token is a valid, unexpired token returned by Generate. | // Valid returns true if token is a valid, unexpired token returned by Generate. | ||||
// validTokenAtTime is like Valid, but it uses now to check if the token is expired. | // validTokenAtTime is like Valid, but it uses now to check if the token is expired. | ||||
func validTokenAtTime(token, key, userID, actionID string, now time.Time) bool { | func validTokenAtTime(token, key, userID, actionID string, now time.Time) bool { | ||||
// Decode the token. | // Decode the token. | ||||
data, err := base64.URLEncoding.DecodeString(token) | |||||
data, err := base64.RawURLEncoding.DecodeString(token) | |||||
if err != nil { | if err != nil { | ||||
return false | return false | ||||
} | } |
sudo: false | sudo: false | ||||
language: go | language: go | ||||
go: | go: | ||||
- 1.3 | |||||
- 1.4 | |||||
- 1.5 | |||||
- tip | |||||
- 1.6.x | |||||
- 1.7.x | |||||
- 1.8.x | |||||
- 1.9.x | |||||
- 1.10.x | |||||
- 1.11.x | |||||
script: go test -v -cover -race | script: go test -v -cover -race | ||||
notifications: | |||||
email: | |||||
- u@gogs.io |
"gopkg.in/macaron.v1" | "gopkg.in/macaron.v1" | ||||
) | ) | ||||
const _VERSION = "0.3.0" | |||||
const _VERSION = "0.4.0" | |||||
func Version() string { | func Version() string { | ||||
return _VERSION | return _VERSION | ||||
TmplName string | TmplName string | ||||
// Configuration section name. Default is "i18n". | // Configuration section name. Default is "i18n". | ||||
Section string | Section string | ||||
// Domain used for `lang` cookie. Default is "" | |||||
CookieDomain string | |||||
} | } | ||||
func prepareOptions(options []Options) Options { | func prepareOptions(options []Options) Options { | ||||
// Save language information in cookies. | // Save language information in cookies. | ||||
if !hasCookie { | if !hasCookie { | ||||
ctx.SetCookie("lang", curLang.Lang, 1<<31-1, "/"+strings.TrimPrefix(opt.SubURL, "/")) | |||||
ctx.SetCookie("lang", curLang.Lang, 1<<31-1, "/"+strings.TrimPrefix(opt.SubURL, "/"), opt.CookieDomain) | |||||
} | } | ||||
restLangs := make([]LangType, 0, i18n.Count()-1) | restLangs := make([]LangType, 0, i18n.Count()-1) |
github.com/go-macaron/captcha | github.com/go-macaron/captcha | ||||
# github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9 | # github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9 | ||||
github.com/go-macaron/cors | github.com/go-macaron/cors | ||||
# github.com/go-macaron/csrf v0.0.0-20180426211211-503617c6b372 | |||||
# github.com/go-macaron/csrf v0.0.0-20190131233648-3751b136073c | |||||
github.com/go-macaron/csrf | github.com/go-macaron/csrf | ||||
# github.com/go-macaron/i18n v0.0.0-20160612092837-ef57533c3b0f | |||||
# github.com/go-macaron/i18n v0.0.0-20190131234336-56731837a73b | |||||
github.com/go-macaron/i18n | github.com/go-macaron/i18n | ||||
# github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191 | # github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191 | ||||
github.com/go-macaron/inject | github.com/go-macaron/inject |