package sessions import ( "net/http" "strconv" "strings" "time" "github.com/kataras/iris/context" ) var ( // CookieExpireDelete may be set on Cookie.Expire for expiring the given cookie. CookieExpireDelete = time.Date(2009, time.November, 10, 23, 0, 0, 0, time.UTC) // CookieExpireUnlimited indicates that the cookie doesn't expire. CookieExpireUnlimited = time.Now().AddDate(24, 10, 10) ) // GetCookie returns cookie's value by it's name // returns empty string if nothing was found func GetCookie(ctx context.Context, name string) string { c, err := ctx.Request().Cookie(name) if err != nil { return "" } return c.Value // return ctx.GetCookie(name) } // AddCookie adds a cookie func AddCookie(ctx context.Context, cookie *http.Cookie, reclaim bool) { // http.SetCookie(ctx.ResponseWriter(), cookie) if reclaim { ctx.Request().AddCookie(cookie) } ctx.SetCookie(cookie) } // RemoveCookie deletes a cookie by it's name/key // If "purge" is true then it removes the, temp, cookie from the request as well. func RemoveCookie(ctx context.Context, config Config) { cookie, err := ctx.Request().Cookie(config.Cookie) if err != nil { return } cookie.Expires = CookieExpireDelete // MaxAge<0 means delete cookie now, equivalently 'Max-Age: 0' cookie.MaxAge = -1 cookie.Value = "" cookie.Path = "/" cookie.Domain = FormatCookieDomain(ctx, config.DisableSubdomainPersistence) AddCookie(ctx, cookie, config.AllowReclaim) if config.AllowReclaim { // delete request's cookie also, which is temporary available. ctx.Request().Header.Set("Cookie", "") } } // IsValidCookieDomain returns true if the receiver is a valid domain to set // valid means that is recognised as 'domain' by the browser, so it(the cookie) can be shared with subdomains also func IsValidCookieDomain(domain string) bool { if domain == "0.0.0.0" || domain == "127.0.0.1" { // for these type of hosts, we can't allow subdomains persistence, // the web browser doesn't understand the mysubdomain.0.0.0.0 and mysubdomain.127.0.0.1 mysubdomain.32.196.56.181. as scorrectly ubdomains because of the many dots // so don't set a cookie domain here, let browser handle this return false } dotLen := strings.Count(domain, ".") if dotLen == 0 { // we don't have a domain, maybe something like 'localhost', browser doesn't see the .localhost as wildcard subdomain+domain return false } if dotLen >= 3 { if lastDotIdx := strings.LastIndexByte(domain, '.'); lastDotIdx != -1 { // chekc the last part, if it's number then propably it's ip if len(domain) > lastDotIdx+1 { _, err := strconv.Atoi(domain[lastDotIdx+1:]) if err == nil { return false } } } } return true } func FormatCookieDomain(ctx context.Context, DisableSubdomainPersistence bool) string { if !DisableSubdomainPersistence { requestDomain := ctx.Host() if portIdx := strings.IndexByte(requestDomain, ':'); portIdx > 0 { requestDomain = requestDomain[0:portIdx] } if IsValidCookieDomain(requestDomain) { // RFC2109, we allow level 1 subdomains, but no further // if we have localhost.com , we want the localhost.cos. // so if we have something like: mysubdomain.localhost.com we want the localhost here // if we have mysubsubdomain.mysubdomain.localhost.com we want the .mysubdomain.localhost.com here // slow things here, especially the 'replace' but this is a good and understable( I hope) way to get the be able to set cookies from subdomains & domain with 1-level limit if dotIdx := strings.LastIndexByte(requestDomain, '.'); dotIdx > 0 { // is mysubdomain.localhost.com || mysubsubdomain.mysubdomain.localhost.com s := requestDomain[0:dotIdx] // set mysubdomain.localhost || mysubsubdomain.mysubdomain.localhost if secondDotIdx := strings.LastIndexByte(s, '.'); secondDotIdx > 0 { //is mysubdomain.localhost || mysubsubdomain.mysubdomain.localhost s = s[secondDotIdx+1:] // set to localhost || mysubdomain.localhost } // replace the s with the requestDomain before the domain's siffux subdomainSuff := strings.LastIndexByte(requestDomain, '.') if subdomainSuff > len(s) { // if it is actual exists as subdomain suffix requestDomain = strings.Replace(requestDomain, requestDomain[0:subdomainSuff], s, 1) // set to localhost.com || mysubdomain.localhost.com } } // finally set the .localhost.com (for(1-level) || .mysubdomain.localhost.com (for 2-level subdomain allow) return "." + requestDomain // . to allow persistence } } return "" }