Versions in this module Expand all Collapse all v0 v0.14.0 Apr 24, 2024 v0.13.0 Feb 27, 2024 Changes in this version + const SessionKeyCsrfToken + var DefaultIgnoreMatcher = matcher.NoneRequest() + var DefaultProtectionMatcher = matcher.NotRequest(matcher.RequestWithMethods("GET", "HEAD", "TRACE", "OPTIONS")) + var FeatureId = security.FeatureId("csrf", security.FeatureOrderCsrf) + var Module = &bootstrap.Module + func MustSet(c context.Context, t *Token) + func Set(c context.Context, t *Token) error + type ChangeCsrfHandler struct + func (h *ChangeCsrfHandler) HandleAuthenticationSuccess(c context.Context, _ *http.Request, _ http.ResponseWriter, ...) + type Configurer struct + func (sc *Configurer) Apply(feature security.Feature, ws security.WebSecurity) error + type CsrfDeniedHandler struct + func (h *CsrfDeniedHandler) HandleAccessDenied(c context.Context, r *http.Request, rw http.ResponseWriter, err error) + func (h *CsrfDeniedHandler) Order() int + type Feature struct + func Configure(ws security.WebSecurity) *Feature + func New() *Feature + func (f *Feature) AddCsrfProtectionMatcher(m web.RequestMatcher) *Feature + func (f *Feature) CsrfDeniedHandler(csrfDeniedHandler security.AccessDeniedHandler) *Feature + func (f *Feature) Identifier() security.FeatureIdentifier + func (f *Feature) IgnoreCsrfProtectionMatcher(m web.RequestMatcher) *Feature + type SessionBackedStore struct + func (store *SessionBackedStore) Generate(c context.Context, parameterName string, headerName string) *Token + func (store *SessionBackedStore) LoadToken(c context.Context) (*Token, error) + func (store *SessionBackedStore) SaveToken(c context.Context, token *Token) error + type Token struct + HeaderName string + ParameterName string + Value string + func Get(c context.Context) *Token + type TokenStore interface + Generate func(c context.Context, parameterName string, headerName string) *Token + LoadToken func(c context.Context) (*Token, error) + SaveToken func(c context.Context, token *Token) error