mirror of
https://codeberg.org/forgejo/forgejo.git
synced 2026-02-03 20:51:07 -05:00
Some checks are pending
/ release (push) Waiting to run
testing-integration / test-unit (push) Waiting to run
testing-integration / test-sqlite (push) Waiting to run
testing-integration / test-mariadb (v10.6) (push) Waiting to run
testing-integration / test-mariadb (v11.8) (push) Waiting to run
testing / backend-checks (push) Waiting to run
testing / frontend-checks (push) Waiting to run
testing / test-unit (push) Blocked by required conditions
testing / test-e2e (push) Blocked by required conditions
testing / test-remote-cacher (redis) (push) Blocked by required conditions
testing / test-remote-cacher (valkey) (push) Blocked by required conditions
testing / test-remote-cacher (garnet) (push) Blocked by required conditions
testing / test-remote-cacher (redict) (push) Blocked by required conditions
testing / test-mysql (push) Blocked by required conditions
testing / test-pgsql (push) Blocked by required conditions
testing / test-sqlite (push) Blocked by required conditions
testing / security-check (push) Blocked by required conditions
Replace the anti-CSRF token with a [cross origin protection by Go](https://go.dev/doc/go1.25#nethttppkgnethttp) that uses a stateless way of verifying if a request was cross origin or not. This allows is to remove al lot of code and replace it with a few lines of code and we no longer have to hand roll this protection. The new protection uses indicators by the browser itself that indicate if the request is cross-origin, thus we no longer have to take care of ensuring the generated CSRF token is passed back to the server any request by the the browser will have send this indicator. Resolves forgejo/forgejo#3538 Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/9830 Reviewed-by: oliverpool <oliverpool@noreply.codeberg.org> Reviewed-by: Mathieu Fenniak <mfenniak@noreply.codeberg.org> Co-authored-by: Gusted <postmaster@gusted.xyz> Co-committed-by: Gusted <postmaster@gusted.xyz>
35 lines
1.2 KiB
JavaScript
35 lines
1.2 KiB
JavaScript
import {isObject} from '../utils.js';
|
|
|
|
// fetch wrapper, use below method name functions and the `data` option to pass in data
|
|
// which will automatically set an appropriate headers. For json content, only object
|
|
// and array types are currently supported.
|
|
export function request(url, {method = 'GET', data, headers = {}, ...other} = {}) {
|
|
let body, contentType;
|
|
if (data instanceof FormData || data instanceof URLSearchParams) {
|
|
body = data;
|
|
} else if (isObject(data) || Array.isArray(data)) {
|
|
contentType = 'application/json';
|
|
body = JSON.stringify(data);
|
|
}
|
|
|
|
const headersMerged = new Headers({
|
|
...(contentType && {'content-type': contentType}),
|
|
});
|
|
|
|
for (const [name, value] of Object.entries(headers)) {
|
|
headersMerged.set(name, value);
|
|
}
|
|
|
|
return fetch(url, {
|
|
method,
|
|
headers: headersMerged,
|
|
...other,
|
|
...(body && {body}),
|
|
});
|
|
}
|
|
|
|
export const GET = (url, opts) => request(url, {method: 'GET', ...opts});
|
|
export const POST = (url, opts) => request(url, {method: 'POST', ...opts});
|
|
export const PATCH = (url, opts) => request(url, {method: 'PATCH', ...opts});
|
|
export const PUT = (url, opts) => request(url, {method: 'PUT', ...opts});
|
|
export const DELETE = (url, opts) => request(url, {method: 'DELETE', ...opts});
|