head 1.1; access; symbols pkgsrc-2026Q1:1.1.0.2 pkgsrc-2026Q1-base:1.1; locks; strict; comment @# @; 1.1 date 2026.01.31.03.18.28; author wen; state Exp; branches; next ; commitid YhX5A4ANoWjhFusG; desc @@ 1.1 log @Import Mojolicious-Plugin-CSRF-1.05 as www/p5-Mojolicious-Plugin-CSRF. This module is a Mojolicious plugin for Cross Site Request Forgery (CSRF) "prevention" (theoretically; if used correctly; caveat emptor). By default, when used, the plugin will cause requests methods that traditionally contain data-changing actions (i.e. POST, PUT, etc.) to check a generated session token against a token from a form value, URL parameter, or HTTP header. On failure, a Mojo::Exception is thrown. @ text @$NetBSD: distinfo,v 1.3 2026/01/31 01:52:47 wen Exp $ BLAKE2s (Mojolicious-Plugin-CSRF-1.05.tar.gz) = a115bd9f183f0f0bd1decad3de840287405f120fcf79d24762e318c32142c6b5 SHA512 (Mojolicious-Plugin-CSRF-1.05.tar.gz) = a9f9127c751aeb463adda66633e347d5737e0d50186f8b55d1a49eed044201daebc75f2aa44512767d4630998012d8905245040c4747712186dbe5c009a912ff Size (Mojolicious-Plugin-CSRF-1.05.tar.gz) = 13005 bytes @