Extends pillarjs/cookies and Egg Cookies to adapt koa and serverless with some additional features.
More encryption than the original version, using a more secure aes-256-gcm algorithm.
@midwayjs/cookies provide an alternative encrypt mode like signed. An encrypt cookie's value will be encrypted base on keys. Anyone who don't have the keys are unable to know the original cookie's value.
import * as Cookies from '@midwayjs/cookies');
ctx.cookies = new Cookies(ctx, keys[, defaultCookieOptions[, defaultGetCookieOptions]]);
ctx.cookies.set('foo', 'bar', { encrypt: true });
ctx.cookies.get('foo', { encrypt: true });Note: you should both indicating in get and set in pairs.
Set a cookie through cookies.set(key, value, options). The parameters supported by options are:
- path - The valid path of the
Stringcookie, the default is/. - domain - The valid domain name range of
Stringcookie, the default isundefined. - expires - the expiration time of the
Datecookie. - maxAge - the maximum valid time of the
Numbercookie. If maxAge is set, the value of expires will be overwritten. - secure - Whether
Booleanis only transmitted in an encrypted channel. Note that if the request is http, it is not allowed to be set to true. If https is automatically set to true. - httpOnly -
BooleanIf set to true, the browser is not allowed to read the value of this cookie. - overwrite -
BooleanIf set to true, repeatedly writing the same key on a request will overwrite the previous value written, the default is false. - signed - Whether
Booleanneeds to sign the cookie or not, the signed parameter needs to be passed when cooperating with get. At this time, the front-end cannot tamper with the cookie. The default is true. - encrypt - Whether
Booleanneeds to encrypt the cookie, you need to pass the encrypt parameter when using get. At this time, the front-end cannot read the real cookie value, and the default is false. - partitioned - Whether
Booleansets cookies for independent partition state (CHIPS). Note that this configuration will only take effect if 'secure' is true. - removeUnpartitioned -
BooleanWhether to delete the cookie with the same name in the non-independent partition state. Note that this configuration will only take effect whenpartitionedis true. - priority -
Stringsets the priority of the cookie, the optional value isLow,Medium,High, only valid for Chrome >= 81 version.
Read a cookie through cookies.get(key, value, options). The parameters supported by options are:
- signed - Whether
Booleanneeds to verify the cookie, and pass the signed parameter when cooperating with the set. At this time, the front-end cannot tamper with the cookie. The default is true. - encrypt - Whether
Booleanneeds to decrypt the cookie, and pass the encrypt parameter when cooperating with the set. At this time, the front-end cannot read the real cookie value, and the default is false.
You can also set default options for get method by passing defaultGetCookieOptions when initializing Cookies:
const cookies = new Cookies(ctx, keys, defaultCookieOptions, { signed: false });
// Now cookies.get('foo') will use signed: false by defaultsigned: false in defaultGetCookieOptions is dangerous as it disables cookie signature verification by default. This makes your application vulnerable to cookie tampering attacks. Only use this option if you fully understand the security implications and have a specific reason to disable signature verification.
Use cookie.set(key, null) to delete a cookie. If the signed parameter is passed, the signature will also be deleted.
MIT