ActionDispatch::Cookies::ChainedCookieJars (original) (raw)

Include in a cookie jar to allow chaining, e.g. cookies.permanent.signed.

Methods

E

P

S

Instance Public methods

Returns a jar that’ll automatically encrypt cookie values before sending them to the client and will decrypt them for read. If the cookie was tampered with by the user (or a 3rd party), nil will be returned.

If config.action_dispatch.encrypted_cookie_salt and config.action_dispatch.encrypted_signed_cookie_salt are both set, legacy cookies encrypted with HMAC AES-256-CBC will be transparently upgraded.

This jar requires that you set a suitable secret for the verification on your app’s secret_key_base.

Example:

cookies.encrypted[:discount] = 45

cookies.encrypted[:discount]

Source: show | on GitHub

def encrypted @encrypted ||= EncryptedKeyRotatingCookieJar.new(self) end

Returns a jar that’ll automatically set the assigned cookies to have an expiration date 20 years from now. Example:

cookies.permanent[:prefers_open_id] = true

This jar is only meant for writing. You’ll read permanent cookies through the regular accessor.

This jar allows chaining with the signed jar as well, so you can set permanent, signed cookies. Examples:

cookies.permanent.signed[:remember_me] = current_user.id

Source: show | on GitHub

def permanent @permanent ||= PermanentCookieJar.new(self) end

Returns a jar that’ll automatically generate a signed representation of cookie value and verify it when reading from the cookie again. This is useful for creating cookies with values that the user is not supposed to change. If a signed cookie was tampered with by the user (or a 3rd party), nil will be returned.

This jar requires that you set a suitable secret for the verification on your app’s secret_key_base.

Example:

cookies.signed[:discount] = 45

cookies.signed[:discount]

Source: show | on GitHub

def signed @signed ||= SignedKeyRotatingCookieJar.new(self) end

Returns the signed or encrypted jar, preferring encrypted if secret_key_base is set. Used by ActionDispatch::Session::CookieStore to avoid the need to introduce new cookie stores.

Source: show | on GitHub

def signed_or_encrypted @signed_or_encrypted ||= if request.secret_key_base.present? encrypted else signed end end