Package Exports
- csurf
This package does not declare an exports field, so the exports above have been automatically detected and optimized by JSPM instead. If any package subpath is missing, it is recommended to post an issue to the original package (csurf) to support the "exports" field. If that is not possible, create a JSPM override to customize the exports field for this package.
Readme
csurf
Node.js CSRF protection middleware.
Requires either a session middleware or cookie-parser to be initialized first.
Install
$ npm install csurf
API
var csrf = require('csurf')
csrf(options)
This middleware adds a req.csrfToken()
function to make a token which should be added to requests which mutate state, within a hidden form field, query-string etc. This token is validated against the visitor's session or csrf cookie.
Options
value
a function accepting the request, returning the token.- The default function checks four possible token locations:
_csrf
parameter inreq.body
generated by thebody-parser
middleware._csrf
parameter inreq.query
generated byquery()
.x-csrf-token
andx-xsrf-token
header fields.
- The default function checks four possible token locations:
cookie
set to a truthy value to enable cookie-based instead of session-based csrf secret storage.- If
cookie
is an object, these options can be configured, otherwise defaults are used:key
the name of the cookie to use (defaults to_csrf
) to store the csrf secret- any other res.cookie options can be set
- If
req.csrfToken()
Lazy-loads the token associated with the request.
Example
var express = require('express')
var csrf = require('csurf')
var app = express()
app.use(csrf())