Merge pull request #188 from uzyn/custom-session-name

Overriding of default session cookie name
This commit is contained in:
bobf 2025-04-17 07:01:16 +01:00 committed by GitHub
commit 8171ab5b5d
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
4 changed files with 38 additions and 13 deletions

View File

@ -7,4 +7,4 @@
<input type="submit" value="Submit Spam" /> <input type="submit" value="Submit Spam" />
</form> </form>
<div>Try clearing `_jetzig_session` cookie before clicking "Submit Spam"</div> <div>Try clearing `_jetzig-session` cookie before clicking "Submit Spam"</div>

View File

@ -497,12 +497,14 @@ pub fn cookies(self: *Request) !*jetzig.http.Cookies {
/// `jetzig.http.Session`. /// `jetzig.http.Session`.
pub fn session(self: *Request) !*jetzig.http.Session { pub fn session(self: *Request) !*jetzig.http.Session {
if (self._session) |capture| return capture; if (self._session) |capture| return capture;
const cookie_name = self.server.env.vars.get("JETZIG_SESSION_COOKIE") orelse
jetzig.http.Session.default_cookie_name;
const local_session = try self.allocator.create(jetzig.http.Session); const local_session = try self.allocator.create(jetzig.http.Session);
local_session.* = jetzig.http.Session.init( local_session.* = jetzig.http.Session.init(
self.allocator, self.allocator,
try self.cookies(), try self.cookies(),
self.server.env.secret, self.server.env.secret,
.{ .cookie_name = cookie_name },
); );
local_session.parse() catch |err| { local_session.parse() catch |err| {
switch (err) { switch (err) {

View File

@ -2,12 +2,12 @@ const std = @import("std");
const jetzig = @import("../../jetzig.zig"); const jetzig = @import("../../jetzig.zig");
pub const cookie_name = "_jetzig-session";
pub const Cipher = std.crypto.aead.chacha_poly.XChaCha20Poly1305; pub const Cipher = std.crypto.aead.chacha_poly.XChaCha20Poly1305;
allocator: std.mem.Allocator, allocator: std.mem.Allocator,
encryption_key: []const u8, encryption_key: []const u8,
cookies: *jetzig.http.Cookies, cookies: *jetzig.http.Cookies,
cookie_name: []const u8,
initialized: bool = false, initialized: bool = false,
data: jetzig.data.Data, data: jetzig.data.Data,
@ -15,22 +15,30 @@ state: enum { parsed, pending } = .pending,
const Self = @This(); const Self = @This();
pub const default_cookie_name = "_jetzig-session";
pub const Options = struct {
cookie_name: []const u8 = default_cookie_name,
};
pub fn init( pub fn init(
allocator: std.mem.Allocator, allocator: std.mem.Allocator,
cookies: *jetzig.http.Cookies, cookies: *jetzig.http.Cookies,
encryption_key: []const u8, encryption_key: []const u8,
options: Options,
) Self { ) Self {
return .{ return .{
.allocator = allocator, .allocator = allocator,
.data = jetzig.data.Data.init(allocator), .data = jetzig.data.Data.init(allocator),
.cookies = cookies, .cookies = cookies,
.cookie_name = options.cookie_name,
.encryption_key = encryption_key, .encryption_key = encryption_key,
}; };
} }
/// Parse session cookie. /// Parse session cookie.
pub fn parse(self: *Self) !void { pub fn parse(self: *Self) !void {
if (self.cookies.get(cookie_name)) |cookie| { if (self.cookies.get(self.cookie_name)) |cookie| {
try self.parseSessionCookie(cookie.value); try self.parseSessionCookie(cookie.value);
} else { } else {
try self.reset(); try self.reset();
@ -111,7 +119,7 @@ fn save(self: *Self) !void {
defer self.allocator.free(encrypted); defer self.allocator.free(encrypted);
const encoded = try jetzig.util.base64Encode(self.allocator, encrypted); const encoded = try jetzig.util.base64Encode(self.allocator, encrypted);
defer self.allocator.free(encoded); defer self.allocator.free(encoded);
try self.cookies.put(.{ .name = cookie_name, .value = encoded }); try self.cookies.put(.{ .name = self.cookie_name, .value = encoded });
} }
fn parseSessionCookie(self: *Self, cookie_value: []const u8) !void { fn parseSessionCookie(self: *Self, cookie_value: []const u8) !void {
@ -180,7 +188,7 @@ test "put and get session key/value" {
try cookies.parse(); try cookies.parse();
const secret: [Cipher.key_length]u8 = [_]u8{0x69} ** Cipher.key_length; const secret: [Cipher.key_length]u8 = [_]u8{0x69} ** Cipher.key_length;
var session = Self.init(allocator, &cookies, &secret); var session = Self.init(allocator, &cookies, &secret, .{});
defer session.deinit(); defer session.deinit();
var data = jetzig.data.Data.init(allocator); var data = jetzig.data.Data.init(allocator);
@ -199,7 +207,7 @@ test "remove session key/value" {
try cookies.parse(); try cookies.parse();
const secret: [Cipher.key_length]u8 = [_]u8{0x69} ** Cipher.key_length; const secret: [Cipher.key_length]u8 = [_]u8{0x69} ** Cipher.key_length;
var session = Self.init(allocator, &cookies, &secret); var session = Self.init(allocator, &cookies, &secret, .{});
defer session.deinit(); defer session.deinit();
var data = jetzig.data.Data.init(allocator); var data = jetzig.data.Data.init(allocator);
@ -224,7 +232,7 @@ test "get value from parsed/decrypted cookie" {
try cookies.parse(); try cookies.parse();
const secret: [Cipher.key_length]u8 = [_]u8{0x69} ** Cipher.key_length; const secret: [Cipher.key_length]u8 = [_]u8{0x69} ** Cipher.key_length;
var session = Self.init(allocator, &cookies, &secret); var session = Self.init(allocator, &cookies, &secret, .{});
defer session.deinit(); defer session.deinit();
try session.parse(); try session.parse();
@ -233,17 +241,32 @@ test "get value from parsed/decrypted cookie" {
} }
test "invalid cookie value - too short" { test "invalid cookie value - too short" {
const allocator = std.testing.allocator;
var cookies = jetzig.http.Cookies.init(allocator, "_jetzig-session=abc");
defer cookies.deinit();
try cookies.parse();
const secret: [Cipher.key_length]u8 = [_]u8{0x69} ** Cipher.key_length;
var session = Self.init(allocator, &cookies, &secret, .{});
defer session.deinit();
try std.testing.expectError(error.JetzigInvalidSessionCookie, session.parse());
}
test "custom session cookie name" {
const allocator = std.testing.allocator; const allocator = std.testing.allocator;
var cookies = jetzig.http.Cookies.init( var cookies = jetzig.http.Cookies.init(
allocator, allocator,
"_jetzig-session=abc", "custom-cookie-name=fPCFwZHvPDT-XCVcsQUSspDLchS3tRuJDqPpB2v3127VXpRP_bPcPLgpHK6RiVkfcP1bMtU",
); );
defer cookies.deinit(); defer cookies.deinit();
try cookies.parse(); try cookies.parse();
const secret: [Cipher.key_length]u8 = [_]u8{0x69} ** Cipher.key_length; const secret: [Cipher.key_length]u8 = [_]u8{0x69} ** Cipher.key_length;
var session = Self.init(allocator, &cookies, &secret); var session = Self.init(allocator, &cookies, &secret, .{ .cookie_name = "custom-cookie-name" });
defer session.deinit(); defer session.deinit();
try std.testing.expectError(error.JetzigInvalidSessionCookie, session.parse()); try session.parse();
var value = (session.get("foo")).?;
try std.testing.expectEqualStrings("bar", try value.toString());
} }

View File

@ -55,7 +55,7 @@ pub fn init(allocator: std.mem.Allocator, routes_module: type) !App {
try cookies.parse(); try cookies.parse();
const session = try alloc.create(jetzig.http.Session); const session = try alloc.create(jetzig.http.Session);
session.* = jetzig.http.Session.init(alloc, cookies, jetzig.testing.secret); session.* = jetzig.http.Session.init(alloc, cookies, jetzig.testing.secret, .{});
app.* = App{ app.* = App{
.arena = arena, .arena = arena,
@ -237,7 +237,7 @@ pub fn initSession(self: *App) !void {
const allocator = self.arena.allocator(); const allocator = self.arena.allocator();
var local_session = try allocator.create(jetzig.http.Session); var local_session = try allocator.create(jetzig.http.Session);
local_session.* = jetzig.http.Session.init(allocator, self.cookies, jetzig.testing.secret); local_session.* = jetzig.http.Session.init(allocator, self.cookies, jetzig.testing.secret, .{});
try local_session.parse(); try local_session.parse();
self.session = local_session; self.session = local_session;