Documentation
¶
Index ¶
- func CleanAll(input string) string
- func CleanInjection(input string) string
- func CleanPathTraversal(input string) string
- func CleanXSS(input string) string
- type FileUploadConfig
- type FileUploadResult
- type Helpers
- func (h *Helpers) CleanInjection(input string) string
- func (h *Helpers) CleanPathTraversal(input string) string
- func (h *Helpers) CleanXSS(input string) string
- func (h *Helpers) CreateDirIfNotExist(path string) error
- func (h *Helpers) CreateFileIfNotExist(path string) error
- func (h *Helpers) Getenv(key string, defaultValue ...string) string
- func (h *Helpers) NewValidator(data url.Values) *Validation
- func (h *Helpers) RandomString(n int) string
- func (h *Helpers) Render(w http.ResponseWriter, r *http.Request, template string, ...) error
- func (h *Helpers) Sanitize(input string) string
- func (h *Helpers) UploadFile(r *http.Request, field string, config FileUploadConfig, fs filesystem.FS) (*FileUploadResult, error)
- type Validation
- func (v *Validation) AddError(key, message string)
- func (v *Validation) Check(ok bool, key, message string)
- func (v *Validation) Has(field string, r *http.Request) bool
- func (v *Validation) HasJSON(json interface{}, fields ...string)
- func (v *Validation) IsDateISO(field, value string)
- func (v *Validation) IsEmail(field, value string)
- func (v *Validation) IsEmailInPublicDomain(field, value string)
- func (v *Validation) IsFloat(field, value string)
- func (v *Validation) IsInt(field, value string)
- func (v *Validation) NoSpaces(field, value string)
- func (v *Validation) NotEmpty(field, value string, message ...string)
- func (v *Validation) Password(field string, value string, length ...int)
- func (v *Validation) PasswordUncompromised(field string, value string, threshold ...int)
- func (v *Validation) Required(r *http.Request, fields ...string)
- func (v *Validation) RequiredJSON(json interface{}, fields ...string)
- func (v *Validation) StringLength(field, value string, minLength, maxLength int)
- func (v *Validation) ToString() string
- func (v *Validation) Valid() bool
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
func CleanInjection ¶ added in v1.0.2
CleanInjection removes common injection attack vectors
func CleanPathTraversal ¶ added in v1.0.2
CleanPathTraversal removes directory traversal attempts
Types ¶
type FileUploadConfig ¶
type FileUploadConfig struct {
MaxSize int64
AllowedMimeTypes []string
TempDir string
Destination string
}
UploadConfig holds upload configuration
type FileUploadResult ¶
type FileUploadResult struct {
OriginalName string
SavedName string
MimeType string
Size int64
Path string
}
UploadResult contains information about uploaded file
type Helpers ¶
type Helpers struct {
Redner *render.Render
FileUploadConfig FileUploadConfig
}
func (*Helpers) CleanInjection ¶ added in v1.0.2
CleanInjection removes common injection attack vectors from user input. Protects against code injection, LDAP injection, and NoSQL injection by removing control characters and special LDAP characters.
Examples:
// Control character removal
input := "Hello\x00World\x08"
clean := h.CleanInjection(input)
// Result: "HelloWorld"
// LDAP injection protection
input := `admin)(uid=*`
clean := h.CleanInjection(input)
// Result: "adminuid=*"
// NoSQL injection protection
input := `{"$ne": null}`
clean := h.CleanInjection(input)
// Result: `{"$ne": null}` (parentheses removed if present)
func (*Helpers) CleanPathTraversal ¶ added in v1.0.2
CleanPathTraversal removes directory traversal attempts from user input. Protects against path traversal attacks by removing ../ and ..\ patterns.
Examples:
// Basic path traversal removal input := `../../../etc/passwd` clean := h.CleanPathTraversal(input) // Result: "etc/passwd" // Windows-style path traversal input := `..\..\..\windows\system32` clean := h.CleanPathTraversal(input) // Result: "windows\system32" // Mixed path separators input := `../documents/../../secret.txt` clean := h.CleanPathTraversal(input) // Result: "documents/secret.txt"
func (*Helpers) CleanXSS ¶ added in v1.0.2
CleanXSS removes XSS attack vectors from user input. Protects against Cross-Site Scripting by removing script tags, event handlers, and javascript: protocols, then escapes remaining HTML.
Examples:
// Script tag removal
input := `<script>alert('xss')</script>Hello`
clean := h.CleanXSS(input)
// Result: "Hello"
// Event handler removal
input := `<div onclick="malicious()">Content</div>`
clean := h.CleanXSS(input)
// Result: "<div>Content</div>"
// JavaScript protocol removal
input := `<a href="javascript:alert('xss')">Link</a>`
clean := h.CleanXSS(input)
// Result: "<a href="">Link</a>"
func (*Helpers) CreateDirIfNotExist ¶
Ensure that a specific directory exists at the given path. If the directory is absent, it proceeds to create it with predefined permissions. This function is useful in scenarios where you need to guarantee that a directory is present before performing operations that require its existence. A directory that is created will have octal value allows the owner to read, write, and execute files within the directory, while the group and others can only read and execute, not alter the content. Example:
Helpers.CreateDirIfNotExist(path)
func (*Helpers) CreateFileIfNotExist ¶
Ensure that a file at the given path exists. If it doesn't, it attempts to create the file. Example:
Helpers.CreateFileIfNotExist(path)
func (*Helpers) Getenv ¶
Get environment variable or return default if the value is an empty string. Example:
Helpers.Getenv("ADELE_API_ADDR", "localhost")
func (*Helpers) NewValidator ¶
func (h *Helpers) NewValidator(data url.Values) *Validation
Create new validator for use with a form.
Example: validator := helpers.NewValidator(r.Form)
func (*Helpers) RandomString ¶
RandomString generates a cryptographically secure random string of specified length using crypto/rand for entropy. The generated string contains alphanumeric characters (a-z, A-Z, 0-9) suitable for tokens, IDs, passwords, and other security-sensitive applications.
Example:
sessionID := helpers.RandomString(32) // Returns: "K7mX9pQr2NvB8zYtF3wL5cR1jP6sM4xH" apiKey := helpers.RandomString(16) // Returns: "aB9Xm2Qr7Kp3Nv8Z" tempPassword := helpers.RandomString(12) // Returns: "M9sK2pR7bN4X"
func (*Helpers) Sanitize ¶ added in v1.0.2
Sanitize removes common OWASP attack vectors from user input including XSS, injection attacks, and path traversal attempts. This method applies all sanitization functions and should be used on any untrusted user input.
Attack vectors protected against:
- Cross-Site Scripting (XSS): Removes <script> tags, event handlers, javascript: protocols
- Code Injection: Removes control characters and null bytes
- LDAP/NoSQL Injection: Removes special LDAP characters
- Path Traversal: Removes directory traversal patterns like ../
Examples:
// Basic XSS protection
input := `<script>alert('xss')</script>Hello`
clean := h.Sanitize(input)
// Result: "Hello"
// Event handler removal
input := `<div onclick="malicious()">Click me</div>`
clean := h.Sanitize(input)
// Result: "<div>Click me</div>"
// JavaScript protocol removal
input := `<a href="javascript:alert('xss')">Link</a>`
clean := h.Sanitize(input)
// Result: "<a href="">Link</a>"
// Path traversal protection
input := `../../../etc/passwd`
clean := h.Sanitize(input)
// Result: "etc/passwd"
// LDAP injection protection
input := `admin)(uid=*`
clean := h.Sanitize(input)
// Result: "adminuid=*"
// Control character removal
input := "Hello\x00World\x08"
clean := h.Sanitize(input)
// Result: "HelloWorld"
// Typical form input sanitization
username := h.Sanitize(r.Form.Get("username"))
comment := h.Sanitize(r.Form.Get("comment"))
filename := h.Sanitize(r.Form.Get("filename"))
Note: This function escapes HTML entities, so legitimate HTML will be converted to safe display text. For rich text that needs to preserve some HTML tags, consider using a more targeted approach or an HTML sanitization library.
func (*Helpers) UploadFile ¶
func (h *Helpers) UploadFile(r *http.Request, field string, config FileUploadConfig, fs filesystem.FS) (*FileUploadResult, error)
UploadFile safely handles multipart file uploads with validation, secure filename generation, and automatic cleanup. Validates MIME type and size, prevents path traversal attacks, and supports both local filesystem and custom storage backends. Example:
config := UploadConfig{
MaxSize: 10 << 20, // 10MB
AllowedMimeTypes: []string{"image/jpeg", "image/png"},
TempDir: "storage/tmp",
Destination: "storage/uploads",
}
result, err := app.UploadFile(r, "avatar", config, nil)
if err != nil {
return fmt.Errorf("upload failed: %w", err)
}
log.Printf("Uploaded %s as %s", result.OriginalName, result.SavedName)
type Validation ¶
func (*Validation) AddError ¶
func (v *Validation) AddError(key, message string)
AddError adds an error message to the validation errors map if the key doesn't already exist. The message supports :attribute placeholder which gets replaced with a formatted field name.
Example:
validator.AddError("email", "The :attribute field must be valid")
Results in: "The email field must be valid"
func (*Validation) Check ¶
func (v *Validation) Check(ok bool, key, message string)
Check adds an error message if the given condition is false. Useful for custom validation logic with conditional error reporting.
Example:
age, _ := strconv.Atoi(r.Form.Get("age"))
validator.Check(age >= 18, "age", "Must be 18 or older")
func (*Validation) Has ¶
func (v *Validation) Has(field string, r *http.Request) bool
Has checks if a field exists in the HTTP request form data and has a non-empty value. Returns true if the field exists and has content, false otherwise.
Example:
if validator.Has("username", r) {
Field exists and has a value
}
func (*Validation) HasJSON ¶
func (v *Validation) HasJSON(json interface{}, fields ...string)
HasJSON validates that specified fields exist in a JSON struct and contain non-empty values. Uses reflection to check both field existence and value content.
Example:
type User struct {
Name string `json:"name"`
Email string `json:"email"`
}
user := &User{Name: "John", Email: ""}
validator.HasJSON(user, "Name", "Email")
Name passes, Email fails validation
func (*Validation) IsDateISO ¶
func (v *Validation) IsDateISO(field, value string)
IsDateISO validates that a field contains a valid date in ISO format (YYYY-MM-DD). Uses Go's time.Parse with the standard date layout for validation.
Example:
birthDate := r.Form.Get("birth_date")
validator.IsDateISO("birth_date", birthDate)
Accepts "2023-12-25", "1990-01-01", but rejects "12/25/2023", "invalid"
func (*Validation) IsEmail ¶
func (v *Validation) IsEmail(field, value string)
IsEmail validates that a field contains a properly formatted email address. Uses the govalidator library for RFC-compliant email validation.
Example:
email := r.Form.Get("email")
validator.IsEmail("email", email)
Validates format like "user@example.com"
func (*Validation) IsEmailInPublicDomain ¶
func (v *Validation) IsEmailInPublicDomain(field, value string)
IsEmailInPublicDomain validates that an email address exists and is in a public domain. Uses govalidator's existence check which may perform DNS lookups.
Example:
email := r.Form.Get("email")
validator.IsEmailInPublicDomain("email", email)
Checks if email domain is reachable and public
func (*Validation) IsFloat ¶
func (v *Validation) IsFloat(field, value string)
IsFloat validates that a field contains a valid floating-point number. Uses strconv.ParseFloat with 64-bit precision for validation.
Example:
price := r.Form.Get("price")
validator.IsFloat("price", price)
Accepts "12.99", "0.5", "123", but rejects "abc", "12.34.56"
func (*Validation) IsInt ¶
func (v *Validation) IsInt(field, value string)
IsInt validates that a field contains a valid integer value. Uses strconv.Atoi for parsing validation.
Example:
quantity := r.Form.Get("quantity")
validator.IsInt("quantity", quantity)
Accepts "123", "-45", but rejects "12.5", "abc"
func (*Validation) NoSpaces ¶
func (v *Validation) NoSpaces(field, value string)
NoSpaces validates that a field contains no whitespace characters. Useful for usernames, slugs, or other fields that shouldn't contain spaces.
Example:
username := r.Form.Get("username")
validator.NoSpaces("username", username)
Accepts "john_doe", "user123", but rejects "john doe", "user name"
func (*Validation) NotEmpty ¶
func (v *Validation) NotEmpty(field, value string, message ...string)
NotEmpty validates that a field is not empty after trimming whitespace. Accepts optional custom error message, otherwise uses default message.
Example:
name := r.Form.Get("name")
validator.NotEmpty("name", name)
Or with custom message:
validator.NotEmpty("name", name, "Name cannot be blank")
func (*Validation) Password ¶
func (v *Validation) Password(field string, value string, length ...int)
Password validates that a password meets security requirements including minimum length, mixed case letters. Default minimum length is 12 characters.
Example:
password := r.Form.Get("password")
validator.Password("password", password) // Uses default 12 char minimum
validator.Password("password", password, 8) // Uses custom 8 char minimum
Requires uppercase, lowercase, and minimum length
func (*Validation) PasswordUncompromised ¶
func (v *Validation) PasswordUncompromised(field string, value string, threshold ...int)
PasswordUncompromised checks if a password appears in known data breaches using the HaveIBeenPwned API with k-anonymity (only sends first 5 chars of SHA1 hash). Optional threshold parameter sets minimum breach count to trigger error (default: 1).
Example:
password := r.Form.Get("password")
validator.PasswordUncompromised("password", password) // Any breach count fails
validator.PasswordUncompromised("password", password, 5) // Only fails if seen 5+ times
Checks against HaveIBeenPwned database securely
func (*Validation) Required ¶
func (v *Validation) Required(r *http.Request, fields ...string)
Required validates that specified fields exist and are not empty in the HTTP request form. Adds error messages for any missing or empty required fields.
Example:
validator.Required(r, "name", "email", "password") Checks that all three fields have values
func (*Validation) RequiredJSON ¶
func (v *Validation) RequiredJSON(json interface{}, fields ...string)
RequiredJSON validates that specified fields exist in a JSON struct using reflection. Checks if the provided interface contains the required fields as struct properties.
Example:
type User struct {
Name string `json:"name"`
Email string `json:"email"`
}
user := &User{}
validator.RequiredJSON(user, "Name", "Email")
func (*Validation) StringLength ¶ added in v1.0.2
func (v *Validation) StringLength(field, value string, minLength, maxLength int)
StringLength validates that a field's value is within the specified length range.
Example:
username := r.Form.Get("username")
validator.StringLength("username", username, 3, 50) // between 3-50 chars
validator.StringLength("username", username, 0, 50) // max 50 chars
func (*Validation) ToString ¶
func (v *Validation) ToString() string
ToString converts the Validation.Errors map to a human-readable string format. Useful for displaying all validation errors as a single message.
Example:
validator.Required(r, "name", "email")
if !validator.Valid() {
errorString := validator.ToString()
Returns: " Name is required Email is required"
}
func (*Validation) Valid ¶
func (v *Validation) Valid() bool
Test if any errors exist.
Example:
if !validator.Valid() {
... Handle validation fail
}