Documentation ¶
Index ¶
Constants ¶
View Source
const ( // CookieName is the name of the CSRF cookie. It's prefixed with "__Host-" as // an additional defense in depth measure. It makes sure it is sent from a // secure page (HTTPS), won't be sent to subdomains, and the path attribute // is set to /. CookieName = "__Host-grv_csrf" // HeaderName is the default HTTP request header to inspect. HeaderName = "X-CSRF-Token" )
Variables ¶
This section is empty.
Functions ¶
func AddCSRFProtection ¶
AddCSRFProtection adds CSRF token into the user session via secure cookie, it implements "double submit cookie" approach to check against CSRF attacks https://www.owasp.org/index.php/Cross-Site_Request_Forgery_%28CSRF%29_Prevention_Cheat_Sheet#Double_Submit_Cookie
func ExtractTokenFromCookie ¶
ExtractTokenFromCookie retrieves a CSRF token from the session cookie.
func VerifyHTTPHeader ¶
VerifyHTTPHeader checks if HTTP header value matches the cookie.
Types ¶
This section is empty.
Click to show internal directories.
Click to hide internal directories.