Gathering detailed insights and metrics for cookie-parser
Gathering detailed insights and metrics for cookie-parser
Gathering detailed insights and metrics for cookie-parser
Gathering detailed insights and metrics for cookie-parser
npm install cookie-parser
98.4
Supply Chain
98.9
Quality
82.8
Maintenance
100
Vulnerability
100
License
Module System
Unable to determine the module system for this package.
Min. Node Version
Typescript Support
Node Version
NPM Version
1,968 Stars
261 Commits
220 Forks
33 Watching
1 Branches
38 Contributors
Updated on 27 Nov 2024
Minified
Minified + Gzipped
JavaScript (100%)
Cumulative downloads
Total Downloads
Last day
-4.4%
724,129
Compared to previous day
Last week
3%
4,131,564
Compared to previous week
Last month
5.7%
17,121,780
Compared to previous month
Last year
13.3%
168,018,279
Compared to previous year
Parse Cookie
header and populate req.cookies
with an object keyed by the
cookie names. Optionally you may enable signed cookie support by passing a
secret
string, which assigns req.secret
so it may be used by other
middleware.
1$ npm install cookie-parser
1var cookieParser = require('cookie-parser')
Create a new cookie parser middleware function using the given secret
and
options
.
secret
a string or array used for signing cookies. This is optional and if
not specified, will not parse signed cookies. If a string is provided, this
is used as the secret. If an array is provided, an attempt will be made to
unsign the cookie with each secret in order.options
an object that is passed to cookie.parse
as the second option. See
cookie for more information.
decode
a function to decode the value of the cookieThe middleware will parse the Cookie
header on the request and expose the
cookie data as the property req.cookies
and, if a secret
was provided, as
the property req.signedCookies
. These properties are name value pairs of the
cookie name to cookie value.
When secret
is provided, this module will unsign and validate any signed cookie
values and move those name value pairs from req.cookies
into req.signedCookies
.
A signed cookie is a cookie that has a value prefixed with s:
. Signed cookies
that fail signature validation will have the value false
instead of the tampered
value.
In addition, this module supports special "JSON cookies". These are cookie where
the value is prefixed with j:
. When these values are encountered, the value will
be exposed as the result of JSON.parse
. If parsing fails, the original value will
remain.
Parse a cookie value as a JSON cookie. This will return the parsed JSON value if it was a JSON cookie, otherwise, it will return the passed value.
Given an object, this will iterate over the keys and call JSONCookie
on each
value, replacing the original value with the parsed value. This returns the
same object that was passed in.
Parse a cookie value as a signed cookie. This will return the parsed unsigned
value if it was a signed cookie and the signature was valid. If the value was
not signed, the original value is returned. If the value was signed but the
signature could not be validated, false
is returned.
The secret
argument can be an array or string. If a string is provided, this
is used as the secret. If an array is provided, an attempt will be made to
unsign the cookie with each secret in order.
Given an object, this will iterate over the keys and check if any value is a signed cookie. If it is a signed cookie and the signature is valid, the key will be deleted from the object and added to the new object that is returned.
The secret
argument can be an array or string. If a string is provided, this
is used as the secret. If an array is provided, an attempt will be made to
unsign the cookie with each secret in order.
1var express = require('express') 2var cookieParser = require('cookie-parser') 3 4var app = express() 5app.use(cookieParser()) 6 7app.get('/', function (req, res) { 8 // Cookies that have not been signed 9 console.log('Cookies: ', req.cookies) 10 11 // Cookies that have been signed 12 console.log('Signed Cookies: ', req.signedCookies) 13}) 14 15app.listen(8080) 16 17// curl command that sends an HTTP request with two cookies 18// curl http://127.0.0.1:8080 --cookie "Cho=Kim;Greet=Hello"
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
6 different organizations found -- score normalized to 10
Details
Reason
no dangerous workflow patterns detected
Reason
license file detected
Details
Reason
no vulnerabilities detected
Reason
3 out of 5 merged PRs checked by a CI test -- score normalized to 6
Reason
2 commit(s) out of 30 and 3 issue activity out of 30 found in the last 90 days -- score normalized to 4
Reason
dependency not pinned by hash detected -- score normalized to 2
Details
Reason
found 25 unreviewed changesets out of 30 -- score normalized to 1
Reason
branch protection not enabled on development/release branches
Details
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
no update tool detected
Details
Reason
project is not fuzzed
Details
Reason
SAST tool is not run on all commits -- score normalized to 0
Details
Reason
security policy file not detected
Details
Reason
detected GitHub workflow tokens with excessive permissions
Details
Score
Last Scanned on 2024-11-25T21:23:38Z
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More