mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2024-11-28 12:16:17 +01:00
Support setting cookie domain (#6288)
Signed-off-by: Tamal Saha <tamal@appscode.com>
This commit is contained in:
parent
d95237b561
commit
2102f9d92d
15 changed files with 58 additions and 46 deletions
|
@ -321,6 +321,8 @@ IMPORT_LOCAL_PATHS = false
|
||||||
DISABLE_GIT_HOOKS = false
|
DISABLE_GIT_HOOKS = false
|
||||||
; Password Hash algorithm, either "pbkdf2", "argon2", "scrypt" or "bcrypt"
|
; Password Hash algorithm, either "pbkdf2", "argon2", "scrypt" or "bcrypt"
|
||||||
PASSWORD_HASH_ALGO = pbkdf2
|
PASSWORD_HASH_ALGO = pbkdf2
|
||||||
|
; Set false to allow JavaScript to read CSRF cookie
|
||||||
|
CSRF_COOKIE_HTTP_ONLY = true
|
||||||
|
|
||||||
[openid]
|
[openid]
|
||||||
;
|
;
|
||||||
|
|
|
@ -198,6 +198,7 @@ Values containing `#` or `;` must be quoted using `` ` `` or `"""`.
|
||||||
- `INTERNAL_TOKEN`: **\<random at every install if no uri set\>**: Secret used to validate communication within Gitea binary.
|
- `INTERNAL_TOKEN`: **\<random at every install if no uri set\>**: Secret used to validate communication within Gitea binary.
|
||||||
- `INTERNAL_TOKEN_URI`: **<empty>**: Instead of defining internal token in the configuration, this configuration option can be used to give Gitea a path to a file that contains the internal token (example value: `file:/etc/gitea/internal_token`)
|
- `INTERNAL_TOKEN_URI`: **<empty>**: Instead of defining internal token in the configuration, this configuration option can be used to give Gitea a path to a file that contains the internal token (example value: `file:/etc/gitea/internal_token`)
|
||||||
- `PASSWORD_HASH_ALGO`: **pbkdf2**: The hash algorithm to use \[pbkdf2, argon2, scrypt, bcrypt\].
|
- `PASSWORD_HASH_ALGO`: **pbkdf2**: The hash algorithm to use \[pbkdf2, argon2, scrypt, bcrypt\].
|
||||||
|
- `CSRF_COOKIE_HTTP_ONLY`: **true**: Set false to allow JavaScript to read CSRF cookie.
|
||||||
|
|
||||||
## OpenID (`openid`)
|
## OpenID (`openid`)
|
||||||
|
|
||||||
|
|
4
go.mod
4
go.mod
|
@ -47,8 +47,8 @@ require (
|
||||||
github.com/go-macaron/cache v0.0.0-20151013081102-561735312776
|
github.com/go-macaron/cache v0.0.0-20151013081102-561735312776
|
||||||
github.com/go-macaron/captcha v0.0.0-20190710000913-8dc5911259df
|
github.com/go-macaron/captcha v0.0.0-20190710000913-8dc5911259df
|
||||||
github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9
|
github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9
|
||||||
github.com/go-macaron/csrf v0.0.0-20180426211211-503617c6b372
|
github.com/go-macaron/csrf v0.0.0-20190131233648-3751b136073c
|
||||||
github.com/go-macaron/i18n v0.0.0-20160612092837-ef57533c3b0f
|
github.com/go-macaron/i18n v0.0.0-20190131234336-56731837a73b
|
||||||
github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191
|
github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191
|
||||||
github.com/go-macaron/session v0.0.0-20190131233854-0a0a789bf193
|
github.com/go-macaron/session v0.0.0-20190131233854-0a0a789bf193
|
||||||
github.com/go-macaron/toolbox v0.0.0-20180818072302-a77f45a7ce90
|
github.com/go-macaron/toolbox v0.0.0-20180818072302-a77f45a7ce90
|
||||||
|
|
8
go.sum
8
go.sum
|
@ -117,10 +117,10 @@ github.com/go-macaron/captcha v0.0.0-20190710000913-8dc5911259df h1:MdgvtI3Y1u/D
|
||||||
github.com/go-macaron/captcha v0.0.0-20190710000913-8dc5911259df/go.mod h1:j9TJ+0nwUOWBvNnm0bheHIPFf3cC62EQo7n7O6PbjZA=
|
github.com/go-macaron/captcha v0.0.0-20190710000913-8dc5911259df/go.mod h1:j9TJ+0nwUOWBvNnm0bheHIPFf3cC62EQo7n7O6PbjZA=
|
||||||
github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9 h1:A0QGzY6UHHEil0I2e7C21JenNNG0mmrj5d9SFWTlgr8=
|
github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9 h1:A0QGzY6UHHEil0I2e7C21JenNNG0mmrj5d9SFWTlgr8=
|
||||||
github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9/go.mod h1:utmMRnVIrXPSfA9MFcpIYKEpKawjKxf62vv62k4707E=
|
github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9/go.mod h1:utmMRnVIrXPSfA9MFcpIYKEpKawjKxf62vv62k4707E=
|
||||||
github.com/go-macaron/csrf v0.0.0-20180426211211-503617c6b372 h1:acrx8CnDmlKl+BPoOOLEK9Ko+SrWFB5pxRuGkKj4iqo=
|
github.com/go-macaron/csrf v0.0.0-20190131233648-3751b136073c h1:yCyrJuFaxKX/VoV9hHqYXhkFEMtg+Hxsiitk1z/lHfQ=
|
||||||
github.com/go-macaron/csrf v0.0.0-20180426211211-503617c6b372/go.mod h1:oZGMxI7MBnicI0jJqJvH4qQzyrWKhtiKxLSJKHC+ydc=
|
github.com/go-macaron/csrf v0.0.0-20190131233648-3751b136073c/go.mod h1:oZGMxI7MBnicI0jJqJvH4qQzyrWKhtiKxLSJKHC+ydc=
|
||||||
github.com/go-macaron/i18n v0.0.0-20160612092837-ef57533c3b0f h1:wDKrZFc9pYJlqFOf7EzGbFMrSFFtyHt3plr2uTdo8Rg=
|
github.com/go-macaron/i18n v0.0.0-20190131234336-56731837a73b h1:p19t0uFyv0zkBwp4dafzU3EcpHilHNffTVDmxpn/M+w=
|
||||||
github.com/go-macaron/i18n v0.0.0-20160612092837-ef57533c3b0f/go.mod h1:MePM/dStkAh+PNzAdNSNl4SGDM2EZvZGken+KpJhM7s=
|
github.com/go-macaron/i18n v0.0.0-20190131234336-56731837a73b/go.mod h1:MePM/dStkAh+PNzAdNSNl4SGDM2EZvZGken+KpJhM7s=
|
||||||
github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191 h1:NjHlg70DuOkcAMqgt0+XA+NHwtu66MkTVVgR4fFWbcI=
|
github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191 h1:NjHlg70DuOkcAMqgt0+XA+NHwtu66MkTVVgR4fFWbcI=
|
||||||
github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191/go.mod h1:VFI2o2q9kYsC4o7VP1HrEVosiZZTd+MVT3YZx4gqvJw=
|
github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191/go.mod h1:VFI2o2q9kYsC4o7VP1HrEVosiZZTd+MVT3YZx4gqvJw=
|
||||||
github.com/go-macaron/session v0.0.0-20190131233854-0a0a789bf193 h1:z/nqwd+ql/r6Q3QGnwNd6B89UjPytM0be5pDQV9TuWw=
|
github.com/go-macaron/session v0.0.0-20190131233854-0a0a789bf193 h1:z/nqwd+ql/r6Q3QGnwNd6B89UjPytM0be5pDQV9TuWw=
|
||||||
|
|
|
@ -34,6 +34,7 @@ func newSessionService() {
|
||||||
SessionConfig.Secure = Cfg.Section("session").Key("COOKIE_SECURE").MustBool(false)
|
SessionConfig.Secure = Cfg.Section("session").Key("COOKIE_SECURE").MustBool(false)
|
||||||
SessionConfig.Gclifetime = Cfg.Section("session").Key("GC_INTERVAL_TIME").MustInt64(86400)
|
SessionConfig.Gclifetime = Cfg.Section("session").Key("GC_INTERVAL_TIME").MustInt64(86400)
|
||||||
SessionConfig.Maxlifetime = Cfg.Section("session").Key("SESSION_LIFE_TIME").MustInt64(86400)
|
SessionConfig.Maxlifetime = Cfg.Section("session").Key("SESSION_LIFE_TIME").MustInt64(86400)
|
||||||
|
SessionConfig.Domain = Cfg.Section("session").Key("DOMAIN").String()
|
||||||
|
|
||||||
shadowConfig, err := json.Marshal(SessionConfig)
|
shadowConfig, err := json.Marshal(SessionConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -287,7 +287,8 @@ var (
|
||||||
// Time settings
|
// Time settings
|
||||||
TimeFormat string
|
TimeFormat string
|
||||||
|
|
||||||
CSRFCookieName = "_csrf"
|
CSRFCookieName = "_csrf"
|
||||||
|
CSRFCookieHTTPOnly = true
|
||||||
|
|
||||||
// Mirror settings
|
// Mirror settings
|
||||||
Mirror struct {
|
Mirror struct {
|
||||||
|
@ -781,6 +782,8 @@ func NewContext() {
|
||||||
ImportLocalPaths = sec.Key("IMPORT_LOCAL_PATHS").MustBool(false)
|
ImportLocalPaths = sec.Key("IMPORT_LOCAL_PATHS").MustBool(false)
|
||||||
DisableGitHooks = sec.Key("DISABLE_GIT_HOOKS").MustBool(false)
|
DisableGitHooks = sec.Key("DISABLE_GIT_HOOKS").MustBool(false)
|
||||||
PasswordHashAlgo = sec.Key("PASSWORD_HASH_ALGO").MustString("pbkdf2")
|
PasswordHashAlgo = sec.Key("PASSWORD_HASH_ALGO").MustString("pbkdf2")
|
||||||
|
CSRFCookieHTTPOnly = sec.Key("CSRF_COOKIE_HTTP_ONLY").MustBool(true)
|
||||||
|
|
||||||
InternalToken = loadInternalToken(sec)
|
InternalToken = loadInternalToken(sec)
|
||||||
IterateBufferSize = Cfg.Section("database").Key("ITERATE_BUFFER_SIZE").MustInt(50)
|
IterateBufferSize = Cfg.Section("database").Key("ITERATE_BUFFER_SIZE").MustInt(50)
|
||||||
LogSQL = Cfg.Section("database").Key("LOG_SQL").MustBool(true)
|
LogSQL = Cfg.Section("database").Key("LOG_SQL").MustBool(true)
|
||||||
|
|
|
@ -181,12 +181,13 @@ func NewMacaron() *macaron.Macaron {
|
||||||
}
|
}
|
||||||
|
|
||||||
m.Use(i18n.I18n(i18n.Options{
|
m.Use(i18n.I18n(i18n.Options{
|
||||||
SubURL: setting.AppSubURL,
|
SubURL: setting.AppSubURL,
|
||||||
Files: localFiles,
|
Files: localFiles,
|
||||||
Langs: setting.Langs,
|
Langs: setting.Langs,
|
||||||
Names: setting.Names,
|
Names: setting.Names,
|
||||||
DefaultLang: "en-US",
|
DefaultLang: "en-US",
|
||||||
Redirect: false,
|
Redirect: false,
|
||||||
|
CookieDomain: setting.SessionConfig.Domain,
|
||||||
}))
|
}))
|
||||||
m.Use(cache.Cacher(cache.Options{
|
m.Use(cache.Cacher(cache.Options{
|
||||||
Adapter: setting.CacheService.Adapter,
|
Adapter: setting.CacheService.Adapter,
|
||||||
|
@ -202,8 +203,9 @@ func NewMacaron() *macaron.Macaron {
|
||||||
Cookie: setting.CSRFCookieName,
|
Cookie: setting.CSRFCookieName,
|
||||||
SetCookie: true,
|
SetCookie: true,
|
||||||
Secure: setting.SessionConfig.Secure,
|
Secure: setting.SessionConfig.Secure,
|
||||||
CookieHttpOnly: true,
|
CookieHttpOnly: setting.CSRFCookieHTTPOnly,
|
||||||
Header: "X-Csrf-Token",
|
Header: "X-Csrf-Token",
|
||||||
|
CookieDomain: setting.SessionConfig.Domain,
|
||||||
CookiePath: setting.AppSubURL,
|
CookiePath: setting.AppSubURL,
|
||||||
}))
|
}))
|
||||||
m.Use(toolbox.Toolboxer(m, toolbox.Options{
|
m.Use(toolbox.Toolboxer(m, toolbox.Options{
|
||||||
|
|
|
@ -58,8 +58,8 @@ func AutoSignIn(ctx *context.Context) (bool, error) {
|
||||||
defer func() {
|
defer func() {
|
||||||
if !isSucceed {
|
if !isSucceed {
|
||||||
log.Trace("auto-login cookie cleared: %s", uname)
|
log.Trace("auto-login cookie cleared: %s", uname)
|
||||||
ctx.SetCookie(setting.CookieUserName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie(setting.CookieUserName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
ctx.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
}
|
}
|
||||||
}()
|
}()
|
||||||
|
|
||||||
|
@ -85,7 +85,7 @@ func AutoSignIn(ctx *context.Context) (bool, error) {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false, err
|
return false, err
|
||||||
}
|
}
|
||||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
return true, nil
|
return true, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -475,9 +475,9 @@ func handleSignIn(ctx *context.Context, u *models.User, remember bool) {
|
||||||
func handleSignInFull(ctx *context.Context, u *models.User, remember bool, obeyRedirect bool) string {
|
func handleSignInFull(ctx *context.Context, u *models.User, remember bool, obeyRedirect bool) string {
|
||||||
if remember {
|
if remember {
|
||||||
days := 86400 * setting.LogInRememberDays
|
days := 86400 * setting.LogInRememberDays
|
||||||
ctx.SetCookie(setting.CookieUserName, u.Name, days, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie(setting.CookieUserName, u.Name, days, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
ctx.SetSuperSecureCookie(base.EncodeMD5(u.Rands+u.Passwd),
|
ctx.SetSuperSecureCookie(base.EncodeMD5(u.Rands+u.Passwd),
|
||||||
setting.CookieRememberName, u.Name, days, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
setting.CookieRememberName, u.Name, days, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
}
|
}
|
||||||
|
|
||||||
_ = ctx.Session.Delete("openid_verified_uri")
|
_ = ctx.Session.Delete("openid_verified_uri")
|
||||||
|
@ -507,10 +507,10 @@ func handleSignInFull(ctx *context.Context, u *models.User, remember bool, obeyR
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
ctx.SetCookie("lang", u.Language, nil, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie("lang", u.Language, nil, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
|
|
||||||
// Clear whatever CSRF has right now, force to generate a new one
|
// Clear whatever CSRF has right now, force to generate a new one
|
||||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
|
|
||||||
// Register last login
|
// Register last login
|
||||||
u.SetLastLogin()
|
u.SetLastLogin()
|
||||||
|
@ -610,7 +610,7 @@ func handleOAuth2SignIn(u *models.User, gothUser goth.User, ctx *context.Context
|
||||||
}
|
}
|
||||||
|
|
||||||
// Clear whatever CSRF has right now, force to generate a new one
|
// Clear whatever CSRF has right now, force to generate a new one
|
||||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
|
|
||||||
// Register last login
|
// Register last login
|
||||||
u.SetLastLogin()
|
u.SetLastLogin()
|
||||||
|
@ -968,10 +968,10 @@ func handleSignOut(ctx *context.Context) {
|
||||||
_ = ctx.Session.Delete("socialId")
|
_ = ctx.Session.Delete("socialId")
|
||||||
_ = ctx.Session.Delete("socialName")
|
_ = ctx.Session.Delete("socialName")
|
||||||
_ = ctx.Session.Delete("socialEmail")
|
_ = ctx.Session.Delete("socialEmail")
|
||||||
ctx.SetCookie(setting.CookieUserName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie(setting.CookieUserName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
ctx.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie(setting.CSRFCookieName, "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
ctx.SetCookie("lang", "", -1, setting.AppSubURL, "", setting.SessionConfig.Secure, true) // Setting the lang cookie will trigger the middleware to reset the language ot previous state.
|
ctx.SetCookie("lang", "", -1, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true) // Setting the lang cookie will trigger the middleware to reset the language ot previous state.
|
||||||
}
|
}
|
||||||
|
|
||||||
// SignOut sign out from login status
|
// SignOut sign out from login status
|
||||||
|
|
|
@ -104,7 +104,7 @@ func ProfilePost(ctx *context.Context, form auth.UpdateProfileForm) {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Update the language to the one we just set
|
// Update the language to the one we just set
|
||||||
ctx.SetCookie("lang", ctx.User.Language, nil, setting.AppSubURL, "", setting.SessionConfig.Secure, true)
|
ctx.SetCookie("lang", ctx.User.Language, nil, setting.AppSubURL, setting.SessionConfig.Domain, setting.SessionConfig.Secure, true)
|
||||||
|
|
||||||
log.Trace("User settings updated: %s", ctx.User.Name)
|
log.Trace("User settings updated: %s", ctx.User.Name)
|
||||||
ctx.Flash.Success(i18n.Tr(ctx.User.Language, "settings.update_profile_success"))
|
ctx.Flash.Success(i18n.Tr(ctx.User.Language, "settings.update_profile_success"))
|
||||||
|
|
1
vendor/github.com/go-macaron/csrf/.travis.yml
generated
vendored
1
vendor/github.com/go-macaron/csrf/.travis.yml
generated
vendored
|
@ -1,7 +1,6 @@
|
||||||
sudo: false
|
sudo: false
|
||||||
language: go
|
language: go
|
||||||
go:
|
go:
|
||||||
- 1.5.x
|
|
||||||
- 1.6.x
|
- 1.6.x
|
||||||
- 1.7.x
|
- 1.7.x
|
||||||
- 1.8.x
|
- 1.8.x
|
||||||
|
|
11
vendor/github.com/go-macaron/csrf/csrf.go
generated
vendored
11
vendor/github.com/go-macaron/csrf/csrf.go
generated
vendored
|
@ -25,7 +25,7 @@ import (
|
||||||
"gopkg.in/macaron.v1"
|
"gopkg.in/macaron.v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
const _VERSION = "0.1.0"
|
const _VERSION = "0.1.1"
|
||||||
|
|
||||||
func Version() string {
|
func Version() string {
|
||||||
return _VERSION
|
return _VERSION
|
||||||
|
@ -58,6 +58,8 @@ type csrf struct {
|
||||||
Form string
|
Form string
|
||||||
// Cookie name value for setting and getting csrf token.
|
// Cookie name value for setting and getting csrf token.
|
||||||
Cookie string
|
Cookie string
|
||||||
|
//Cookie domain
|
||||||
|
CookieDomain string
|
||||||
//Cookie path
|
//Cookie path
|
||||||
CookiePath string
|
CookiePath string
|
||||||
// Cookie HttpOnly flag value used for the csrf token.
|
// Cookie HttpOnly flag value used for the csrf token.
|
||||||
|
@ -123,8 +125,10 @@ type Options struct {
|
||||||
Form string
|
Form string
|
||||||
// Cookie value used to set and get token.
|
// Cookie value used to set and get token.
|
||||||
Cookie string
|
Cookie string
|
||||||
|
// Cookie domain.
|
||||||
|
CookieDomain string
|
||||||
// Cookie path.
|
// Cookie path.
|
||||||
CookiePath string
|
CookiePath string
|
||||||
CookieHttpOnly bool
|
CookieHttpOnly bool
|
||||||
// Key used for getting the unique ID per user.
|
// Key used for getting the unique ID per user.
|
||||||
SessionKey string
|
SessionKey string
|
||||||
|
@ -187,6 +191,7 @@ func Generate(options ...Options) macaron.Handler {
|
||||||
Header: opt.Header,
|
Header: opt.Header,
|
||||||
Form: opt.Form,
|
Form: opt.Form,
|
||||||
Cookie: opt.Cookie,
|
Cookie: opt.Cookie,
|
||||||
|
CookieDomain: opt.CookieDomain,
|
||||||
CookiePath: opt.CookiePath,
|
CookiePath: opt.CookiePath,
|
||||||
CookieHttpOnly: opt.CookieHttpOnly,
|
CookieHttpOnly: opt.CookieHttpOnly,
|
||||||
ErrorFunc: opt.ErrorFunc,
|
ErrorFunc: opt.ErrorFunc,
|
||||||
|
@ -222,7 +227,7 @@ func Generate(options ...Options) macaron.Handler {
|
||||||
// FIXME: actionId.
|
// FIXME: actionId.
|
||||||
x.Token = GenerateToken(x.Secret, x.ID, "POST")
|
x.Token = GenerateToken(x.Secret, x.ID, "POST")
|
||||||
if opt.SetCookie {
|
if opt.SetCookie {
|
||||||
ctx.SetCookie(opt.Cookie, x.Token, 0, opt.CookiePath, "", opt.Secure, opt.CookieHttpOnly, time.Now().AddDate(0, 0, 1))
|
ctx.SetCookie(opt.Cookie, x.Token, 0, opt.CookiePath, opt.CookieDomain, opt.Secure, opt.CookieHttpOnly, time.Now().AddDate(0, 0, 1))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
4
vendor/github.com/go-macaron/csrf/xsrf.go
generated
vendored
4
vendor/github.com/go-macaron/csrf/xsrf.go
generated
vendored
|
@ -50,7 +50,7 @@ func generateTokenAtTime(key, userID, actionID string, now time.Time) string {
|
||||||
h := hmac.New(sha1.New, []byte(key))
|
h := hmac.New(sha1.New, []byte(key))
|
||||||
fmt.Fprintf(h, "%s:%s:%d", clean(userID), clean(actionID), now.UnixNano())
|
fmt.Fprintf(h, "%s:%s:%d", clean(userID), clean(actionID), now.UnixNano())
|
||||||
tok := fmt.Sprintf("%s:%d", h.Sum(nil), now.UnixNano())
|
tok := fmt.Sprintf("%s:%d", h.Sum(nil), now.UnixNano())
|
||||||
return base64.URLEncoding.EncodeToString([]byte(tok))
|
return base64.RawURLEncoding.EncodeToString([]byte(tok))
|
||||||
}
|
}
|
||||||
|
|
||||||
// Valid returns true if token is a valid, unexpired token returned by Generate.
|
// Valid returns true if token is a valid, unexpired token returned by Generate.
|
||||||
|
@ -61,7 +61,7 @@ func ValidToken(token, key, userID, actionID string) bool {
|
||||||
// validTokenAtTime is like Valid, but it uses now to check if the token is expired.
|
// validTokenAtTime is like Valid, but it uses now to check if the token is expired.
|
||||||
func validTokenAtTime(token, key, userID, actionID string, now time.Time) bool {
|
func validTokenAtTime(token, key, userID, actionID string, now time.Time) bool {
|
||||||
// Decode the token.
|
// Decode the token.
|
||||||
data, err := base64.URLEncoding.DecodeString(token)
|
data, err := base64.RawURLEncoding.DecodeString(token)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return false
|
return false
|
||||||
}
|
}
|
||||||
|
|
15
vendor/github.com/go-macaron/i18n/.travis.yml
generated
vendored
15
vendor/github.com/go-macaron/i18n/.travis.yml
generated
vendored
|
@ -1,14 +1,11 @@
|
||||||
sudo: false
|
sudo: false
|
||||||
language: go
|
language: go
|
||||||
|
|
||||||
go:
|
go:
|
||||||
- 1.3
|
- 1.6.x
|
||||||
- 1.4
|
- 1.7.x
|
||||||
- 1.5
|
- 1.8.x
|
||||||
- tip
|
- 1.9.x
|
||||||
|
- 1.10.x
|
||||||
|
- 1.11.x
|
||||||
|
|
||||||
script: go test -v -cover -race
|
script: go test -v -cover -race
|
||||||
|
|
||||||
notifications:
|
|
||||||
email:
|
|
||||||
- u@gogs.io
|
|
||||||
|
|
6
vendor/github.com/go-macaron/i18n/i18n.go
generated
vendored
6
vendor/github.com/go-macaron/i18n/i18n.go
generated
vendored
|
@ -26,7 +26,7 @@ import (
|
||||||
"gopkg.in/macaron.v1"
|
"gopkg.in/macaron.v1"
|
||||||
)
|
)
|
||||||
|
|
||||||
const _VERSION = "0.3.0"
|
const _VERSION = "0.4.0"
|
||||||
|
|
||||||
func Version() string {
|
func Version() string {
|
||||||
return _VERSION
|
return _VERSION
|
||||||
|
@ -96,6 +96,8 @@ type Options struct {
|
||||||
TmplName string
|
TmplName string
|
||||||
// Configuration section name. Default is "i18n".
|
// Configuration section name. Default is "i18n".
|
||||||
Section string
|
Section string
|
||||||
|
// Domain used for `lang` cookie. Default is ""
|
||||||
|
CookieDomain string
|
||||||
}
|
}
|
||||||
|
|
||||||
func prepareOptions(options []Options) Options {
|
func prepareOptions(options []Options) Options {
|
||||||
|
@ -193,7 +195,7 @@ func I18n(options ...Options) macaron.Handler {
|
||||||
|
|
||||||
// Save language information in cookies.
|
// Save language information in cookies.
|
||||||
if !hasCookie {
|
if !hasCookie {
|
||||||
ctx.SetCookie("lang", curLang.Lang, 1<<31-1, "/"+strings.TrimPrefix(opt.SubURL, "/"))
|
ctx.SetCookie("lang", curLang.Lang, 1<<31-1, "/"+strings.TrimPrefix(opt.SubURL, "/"), opt.CookieDomain)
|
||||||
}
|
}
|
||||||
|
|
||||||
restLangs := make([]LangType, 0, i18n.Count()-1)
|
restLangs := make([]LangType, 0, i18n.Count()-1)
|
||||||
|
|
4
vendor/modules.txt
vendored
4
vendor/modules.txt
vendored
|
@ -128,9 +128,9 @@ github.com/go-macaron/cache/redis
|
||||||
github.com/go-macaron/captcha
|
github.com/go-macaron/captcha
|
||||||
# github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9
|
# github.com/go-macaron/cors v0.0.0-20190309005821-6fd6a9bfe14e9
|
||||||
github.com/go-macaron/cors
|
github.com/go-macaron/cors
|
||||||
# github.com/go-macaron/csrf v0.0.0-20180426211211-503617c6b372
|
# github.com/go-macaron/csrf v0.0.0-20190131233648-3751b136073c
|
||||||
github.com/go-macaron/csrf
|
github.com/go-macaron/csrf
|
||||||
# github.com/go-macaron/i18n v0.0.0-20160612092837-ef57533c3b0f
|
# github.com/go-macaron/i18n v0.0.0-20190131234336-56731837a73b
|
||||||
github.com/go-macaron/i18n
|
github.com/go-macaron/i18n
|
||||||
# github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191
|
# github.com/go-macaron/inject v0.0.0-20160627170012-d8a0b8677191
|
||||||
github.com/go-macaron/inject
|
github.com/go-macaron/inject
|
||||||
|
|
Loading…
Reference in a new issue