Installations
npm install cookies.js
Score
71.3
Supply Chain
90.9
Quality
74.3
Maintenance
100
Vulnerability
100
License
Releases
Unable to fetch releases
Developer
zeekay
Developer Guide
Module System
CommonJS
Min. Node Version
Typescript Support
No
Node Version
7.8.0
NPM Version
4.4.4
Statistics
2 Stars
566 Commits
2 Watching
14 Branches
1 Contributors
Updated on 19 Mar 2021
Languages
JavaScript (88.19%)
CoffeeScript (6.07%)
HTML (5.74%)
Total Downloads
Cumulative downloads
Total Downloads
98,829
Last day
-92.9%
1
Compared to previous day
Last week
85%
74
Compared to previous week
Last month
-41.1%
310
Compared to previous month
Last year
-49.4%
8,414
Compared to previous year
Daily Downloads
Weekly Downloads
Monthly Downloads
Yearly Downloads
Dependencies
2
cookies.js
A simple, lightweight JavaScript API for handling cookies. This is a module-friendly rewrite of js-cookie.
- Works in all browsers
- Accepts any character
- Heavily tested
- Unobtrusive JSON support
- Supports CommonJS and ES modules
- RFC 6265 compliant
Installation
1$ npm install cookies.js --save
Basic Usage
Create a cookie, valid across the entire site:
1Cookies.set('name', 'value');
Create a cookie that expires 7 days from now, valid across the entire site:
1Cookies.set('name', 'value', { expires: 7 });
Create an expiring cookie, valid to the path of the current page:
1Cookies.set('name', 'value', { expires: 7, path: '' });
Read cookie:
1Cookies.get('name'); // => 'value' 2Cookies.get('nothing'); // => undefined
Read all visible cookies:
1Cookies.get(); // => { name: 'value' }
Delete cookie:
1Cookies.remove('name');
Delete a cookie valid to the path of the current page:
1Cookies.set('name', 'value', { path: '' }); 2Cookies.remove('name'); // fail! 3Cookies.remove('name', { path: '' }); // removed!
IMPORTANT! when deleting a cookie, you must pass the exact same path and domain attributes that was used to set the cookie, unless you're relying on the default attributes.
Note: Removing unexisting cookie does not raise any exception nor return any value
Namespace conflicts
If there is any danger of a conflict with the namespace Cookies
, the noConflict
method will allow you to define a new namespace and preserve the original one. This is especially useful when running the script on third party sites e.g. as part of a widget or SDK.
1// Assign the js-cookie api to a different variable and restore the original "window.Cookies" 2var Cookies2 = Cookies.noConflict(); 3Cookies2.set('name', 'value');
Note: The .noConflict
method is not necessary when using AMD or CommonJS, thus it is not exposed in those environments.
JSON
js-cookie provides unobtrusive JSON storage for cookies.
When creating a cookie you can pass an Array or Object Literal instead of a string in the value. If you do so, js-cookie will store the string representation of the object according to JSON.stringify
:
1Cookies.set('name', { foo: 'bar' });
When reading a cookie with the default Cookies.get
api, you receive the string representation stored in the cookie:
1Cookies.get('name'); // => '{"foo":"bar"}'
1Cookies.get(); // => { name: '{"foo":"bar"}' }
When reading a cookie with the Cookies.getJSON
api, you receive the parsed representation of the string stored in the cookie according to JSON.parse
:
1Cookies.getJSON('name'); // => { foo: 'bar' }
1Cookies.getJSON(); // => { name: { foo: 'bar' } }
Note: To support IE6-7 (and IE 8 compatibility mode) you need to include the JSON-js polyfill: https://github.com/douglascrockford/JSON-js
Encoding
This project is RFC 6265 compliant. All special characters that are not allowed in the cookie-name or cookie-value are encoded with each one's UTF-8 Hex equivalent using percent-encoding.
The only character in cookie-name or cookie-value that is allowed and still encoded is the percent %
character, it is escaped in order to interpret percent input as literal.
Please note that the default encoding/decoding strategy is meant to be interoperable only between cookies that are read/written by js-cookie. To override the default encoding/decoding strategy you need to use a converter.
Cookie Attributes
Cookie attributes defaults can be set globally by setting properties of the Cookies.defaults
object or individually for each call to Cookies.set(...)
by passing a plain object in the last argument. Per-call attributes override the default attributes.
expires
Define when the cookie will be removed. Value can be a Number
which will be interpreted as days from time of creation or a Date
instance. If omitted, the cookie becomes a session cookie.
To create a cookie that expires in less than a day, you can check the FAQ on the Wiki.
Default: Cookie is removed when the user closes the browser.
Examples:
1Cookies.set('name', 'value', { expires: 365 }); 2Cookies.get('name'); // => 'value' 3Cookies.remove('name');
path
A String
indicating the path where the cookie is visible.
Default: /
Examples:
1Cookies.set('name', 'value', { path: '' }); 2Cookies.get('name'); // => 'value' 3Cookies.remove('name', { path: '' });
Note regarding Internet Explorer:
Due to an obscure bug in the underlying WinINET InternetGetCookie implementation, IE’s document.cookie will not return a cookie if it was set with a path attribute containing a filename.
(From Internet Explorer Cookie Internals (FAQ))
This means one cannot set a path using path: window.location.pathname
in case such pathname contains a filename like so: /check.html
(or at least, such cookie cannot be read correctly).
domain
A String
indicating a valid domain where the cookie should be visible. The cookie will also be visible to all subdomains.
Default: Cookie is visible only to the domain or subdomain of the page where the cookie was created, except for Internet Explorer (see below).
Examples:
Assuming a cookie that is being created on site.com
:
1Cookies.set('name', 'value', { domain: 'subdomain.site.com' }); 2Cookies.get('name'); // => undefined (need to read at 'subdomain.site.com')
Note regarding Internet Explorer default behavior:
Q3: If I don’t specify a DOMAIN attribute (for) a cookie, IE sends it to all nested subdomains anyway? A: Yes, a cookie set on example.com will be sent to sub2.sub1.example.com. Internet Explorer differs from other browsers in this regard.
(From Internet Explorer Cookie Internals (FAQ))
This means that if you omit the domain
attribute, it will be visible for a subdomain in IE.
secure
Either true
or false
, indicating if the cookie transmission requires a secure protocol (https).
Default: No secure protocol requirement.
Examples:
1Cookies.set('name', 'value', { secure: true }); 2Cookies.get('name'); // => 'value' 3Cookies.remove('name', { secure: true });
Converters
Read
Create a new instance of the api that overrides the default decoding implementation.
All get methods that rely in a proper decoding to work, such as Cookies.get()
and Cookies.get('name')
, will run the converter first for each cookie.
The returning String will be used as the cookie value.
Example from reading one of the cookies that can only be decoded using the escape
function:
1document.cookie = 'escaped=%u5317'; 2document.cookie = 'default=%E5%8C%97'; 3var cookies = Cookies.withConverter(function (value, name) { 4 if ( name === 'escaped' ) { 5 return unescape(value); 6 } 7}); 8cookies.get('escaped'); // 北 9cookies.get('default'); // 北 10cookies.get(); // { escaped: '北', default: '北' }
Write
Create a new instance of the api that overrides the default encoding implementation:
1Cookies.withConverter({ 2 read: function (value, name) { 3 // Read converter 4 }, 5 write: function (value, name) { 6 // Write converter 7 } 8});
Server-side integration
Check out the Servers Docs
Contributing
Check out the Contributing Guidelines
Manual release steps
- Increment the "version" attribute of
package.json
- Increment the version number in the
src/js.cookies.js
file - Commit with the message "Release version x.x.x"
- Create version tag in git
- Create a github release and upload the minified file
- Change the
latest
tag pointer to the latest commitgit tag -f latest
git push <remote> :refs/tags/latest
git push origin master --tags
- Release on npm
Credit
Original project was authored by:
- Klaus Hartl
- Fagner Brack
- And awesome contributors
License
No vulnerabilities found.
Reason
no binaries found in the repo
Reason
0 existing vulnerabilities detected
Reason
license file detected
Details
- Info: project has a license file: LICENSE:0
- Info: FSF or OSI recognized license: MIT License: LICENSE:0
Reason
Found 0/30 approved changesets -- score normalized to 0
Reason
no SAST tool detected
Details
- Warn: no pull requests merged into dev branch
Reason
0 commit(s) and 0 issue activity found in the last 90 days -- score normalized to 0
Reason
no effort to earn an OpenSSF best practices badge detected
Reason
security policy file not detected
Details
- Warn: no security policy file detected
- Warn: no security file to analyze
- Warn: no security file to analyze
- Warn: no security file to analyze
Reason
project is not fuzzed
Details
- Warn: no fuzzer integrations found
Reason
branch protection not enabled on development/release branches
Details
- Warn: branch protection not enabled for branch 'master'
Score
3
/10
Last Scanned on 2024-11-18
The Open Source Security Foundation is a cross-industry collaboration to improve the security of open source software (OSS). The Scorecard provides security health metrics for open source projects.
Learn More