summaryrefslogtreecommitdiffabout
path: root/src/cookies.cc
Unidiff
Diffstat (limited to 'src/cookies.cc') (more/less context) (ignore whitespace changes)
-rw-r--r--src/cookies.cc242
1 files changed, 242 insertions, 0 deletions
diff --git a/src/cookies.cc b/src/cookies.cc
new file mode 100644
index 0000000..40a0c8b
--- a/dev/null
+++ b/src/cookies.cc
@@ -0,0 +1,242 @@
1#include "kingate/cookies.h"
2#include "kingate/util.h"
3#include "kingate/exception.h"
4
5namespace kingate {
6
7 /*
8 * RFC 2109:
9 * av-pairs = av-pair *(";" av-pair)
10 * av-pair = attr ["=" value] ; optional value
11 * attr = token
12 * value = word
13 * word = token | quoted-string
14 */
15
16 /* RFC 2109:
17 *
18 * The origin server effectively ends a session by sending the client a
19 * Set-Cookie header with Max-Age=0.
20 *
21 * An origin server may include multiple Set-Cookie headers in a response.
22 * Note that an intervening gateway could fold multiple such headers into a
23 * single header.
24 *
25 *
26 * set-cookie = "Set-Cookie:" cookies
27 * cookies = 1#cookie
28 * cookie = NAME "=" VALUE *(";" cookie-av)
29 * NAME = attr
30 * VALUE = value
31 * cookie-av = "Comment" "=" value
32 * | "Domain" "=" value
33 * | "Max-Age" "=" value
34 * | "Path" "=" value
35 * | "Secure"
36 * | "Version" "=" 1*DIGIT
37 *
38 *
39 * The origin server should send the following additional HTTP/1.1
40 * response headers, depending on circumstances:
41 *
42 * * To suppress caching of the Set-Cookie header: Cache-control: no-
43 * cache="set-cookie".
44 *
45 * and one of the following:
46 *
47 * * To suppress caching of a private document in shared caches: Cache-
48 * control: private.
49 *
50 * * To allow caching of a document and require that it be validated
51 * before returning it to the client: Cache-control: must-revalidate.
52 *
53 * * To allow caching of a document, but to require that proxy caches
54 * (not user agent caches) validate it before returning it to the
55 * client: Cache-control: proxy-revalidate.
56 *
57 * * To allow caching of a document and request that it be validated
58 * before returning it to the client (by "pre-expiring" it):
59 * Cache-control: max-age=0. Not all caches will revalidate the
60 * document in every case.
61 *
62 * HTTP/1.1 servers must send Expires: old-date (where old-date is a
63 * date long in the past) on responses containing Set-Cookie response
64 * headers unless they know for certain (by out of band means) that
65 * there are no downsteam HTTP/1.0 proxies. HTTP/1.1 servers may send
66 * other Cache-Control directives that permit caching by HTTP/1.1
67 * proxies in addition to the Expires: old-date directive; the Cache-
68 * Control directive will override the Expires: old-date for HTTP/1.1
69 * proxies.
70 *
71 */
72
73 void cookie::_set_string(const string& p,const string& v) {
74 (*this)[p]=v;
75 }
76
77 void cookie::set_comment(const string& c) {
78 _set_string("comment",c);
79 }
80 void cookie::set_domain(const string& d) {
81 _set_string("domain",d);
82 }
83 void cookie::set_max_age(const string& ma) {
84 _set_string("max-age",ma);
85 }
86 void cookie::set_path(const string& p) {
87 _set_string("path",p);
88 }
89 void cookie::set_secure(bool s) {
90 if(s)
91 _set_string("secure","");
92 else
93 erase("secure");
94 }
95
96 void cookie::set_expires(const string& e) {
97 (*this)["expires"] = e;
98 }
99
100 const string& cookie::_get_string(const string& s) const {
101 const_iterator i = find(s);
102 if(i==end())
103 throw exception_notfound(CODEPOINT,"No parameter set");
104 return i->second;
105 }
106
107 const string& cookie::get_comment() const {
108 return _get_string("comment");
109 }
110 const string& cookie::get_domain() const {
111 return _get_string("domain");
112 }
113 const string& cookie::get_max_age() const {
114 return _get_string("max-age");
115 }
116 const string& cookie::get_path() const {
117 return _get_string("path");
118 }
119 bool cookie::get_secure() const {
120 return find("secure")!=end();
121 }
122
123 const string& cookie::get_expires() const {
124 return _get_string("expires");
125 }
126
127 bool cookie::has_comment() const {
128 return find("comment")!=end();
129 }
130 bool cookie::has_domain() const {
131 return find("domain")!=end();
132 }
133 bool cookie::has_max_age() const {
134 return find("max-age")!=end();
135 }
136 bool cookie::has_path() const {
137 return find("path")!=end();
138 }
139
140 bool cookie::has_expires() const {
141 return find("expires")!=end();
142 }
143
144 void cookie::unset_comment() {
145 erase("comment");
146 }
147 void cookie::unset_domain() {
148 erase("domain");
149 }
150 void cookie::unset_max_age() {
151 erase("max-age");
152 }
153 void cookie::unset_path() {
154 erase("path");
155 }
156
157 void cookie::unset_expires() {
158 erase("expires");
159 }
160
161 string cookie::set_cookie_header_rfc2109() const {
162 string rv = name + "=" + http_quoted_string(value);
163 for(const_iterator i=begin();i!=end();++i) {
164 if(i->first=="secure") {
165 rv += "; secure";
166 }else{
167 rv += "; "+i->first+"="+http_quote(i->second);
168 }
169 }
170 rv += "; Version=1";
171 return rv;
172 }
173
174 string cookie::set_cookie_header() const {
175 string rv = name + "=" + value;
176 for(const_iterator i=begin();i!=end();++i) {
177 if(i->first=="secure") {
178 rv += "; secure";
179 }else{
180 rv += "; "+i->first+"="+i->second;
181 }
182 }
183 return rv;
184 }
185
186 bool cookies_t::has_cookie(const key_type& n) const {
187 return find(n)!=end();
188 }
189
190 const cookie& cookies_t::get_cookie(const key_type& n) const {
191 const_iterator i=find(n);
192 if(i==end())
193 throw exception_notfound(CODEPOINT,"No cookie with such name found");
194 return i->second;
195 }
196
197 cookie& cookies_t::get_cookie(const key_type& n) {
198 iterator i=find(n);
199 if(i==end())
200 throw exception_notfound(CODEPOINT,"No cookie with such name found");
201 return i->second;
202 }
203
204 void cookies_t::parse_cookies(const string& s) {
205 string str = s;
206 while(!str.empty()) {
207 string::size_type sc = str.find(';');
208 string s;
209 if(sc==string::npos) {
210 s = str;
211 str.erase();
212 }else{
213 s = str.substr(0,sc);
214 str.erase(0,sc+1);
215 }
216 string::size_type nsp=s.find_first_not_of(" \t");
217 if((nsp!=string::npos) && nsp)
218 s.erase(0,nsp);
219 string::size_type eq=s.find('=');
220 if(eq==string::npos)
221 continue;
222 string n = s.substr(0,eq);
223 s.erase(0,eq+1);
224 nsp = n.find_last_not_of(" \t");
225 n.erase(nsp+1);
226 nsp = s.find_first_not_of(" \t");
227 string v;
228 if(nsp!=string::npos)
229 v = s.substr(nsp);
230 else
231 v = s;
232 nsp = v.find_last_not_of(" \t");
233 if(nsp==string::npos)
234 v.erase();
235 else
236 v.erase(nsp+1);
237 cookie& c = (*this)[n];
238 c.set_name(n); c.set_value(v);
239 }
240 }
241
242}