gophertype/pkg/middleware/csrf.go
Noah Petherbridge 898f82fb79 Modernize Backend Go App
* Remove Negroni in favor of the standard net/http server.
* Remove gorilla/mux in favor of the standard net/http NewServeMux.
* Remove gorilla/sessions in favor of Redis session_id cookie.
* Remove the hacky glue controllers setup in favor of regular defined routes
  in the router.go file directly.
* Update all Go dependencies for Go 1.24
* Move and centralize all the HTTP middlewares.
* Add middlewares for Logging and Recovery to replace Negroni's.
2025-04-03 22:45:34 -07:00

52 lines
1.5 KiB
Go

package middleware
import (
"context"
"net/http"
"git.kirsle.net/apps/gophertype/pkg/constants"
"git.kirsle.net/apps/gophertype/pkg/responses"
"git.kirsle.net/apps/gophertype/pkg/session"
uuid "github.com/satori/go.uuid"
)
// CSRF prevents Cross-Site Request Forgery.
// All "POST" requests are required to have an "_csrf" variable passed in which
// matches the "csrf_token" HTTP cookie with their request.
func CSRF(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
// All requests: verify they have a CSRF cookie, create one if not.
var token string
cookie, err := r.Cookie(constants.CSRFCookieName)
if err == nil {
token = cookie.Value
}
// Generate a token cookie if not found.
if len(token) < 8 || err != nil {
token = uuid.NewV4().String()
cookie = &http.Cookie{
Name: constants.CSRFCookieName,
Value: token,
}
http.SetCookie(w, cookie)
}
// Add the CSRF token to the request context. This makes it immediately
// available on FIRST page load, when the cookie hasn't been sent back
// from the browser yet.
ctx := context.WithValue(r.Context(), session.CSRFKey, token)
// POST requests: verify token from form parameter.
if r.Method == http.MethodPost {
compare := r.FormValue(constants.CSRFFormName)
if compare != token {
responses.Panic(w, http.StatusForbidden, "CSRF token failure.")
return
}
}
next.ServeHTTP(w, r.WithContext(ctx))
})
}