-
Notifications
You must be signed in to change notification settings - Fork 43
/
xss_front.go
56 lines (43 loc) · 1.53 KB
/
xss_front.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
// Code generated by go-swagger; DO NOT EDIT.
package xss
// This file was generated by the swagger tool.
// Editing this file might prove futile when you re-run the generate command
import (
"net/http"
"github.com/go-openapi/runtime/middleware"
)
// XSSFrontHandlerFunc turns a function with the right signature into a XSS front handler
type XSSFrontHandlerFunc func(XSSFrontParams) middleware.Responder
// Handle executing the request and returning a response
func (fn XSSFrontHandlerFunc) Handle(params XSSFrontParams) middleware.Responder {
return fn(params)
}
// XSSFrontHandler interface for that can handle valid XSS front params
type XSSFrontHandler interface {
Handle(XSSFrontParams) middleware.Responder
}
// NewXSSFront creates a new http.Handler for the XSS front operation
func NewXSSFront(ctx *middleware.Context, handler XSSFrontHandler) *XSSFront {
return &XSSFront{Context: ctx, Handler: handler}
}
/*
XSSFront swagger:route GET /xss xss xssFront
front page of the Reflected XSS vulnerability
*/
type XSSFront struct {
Context *middleware.Context
Handler XSSFrontHandler
}
func (o *XSSFront) ServeHTTP(rw http.ResponseWriter, r *http.Request) {
route, rCtx, _ := o.Context.RouteInfo(r)
if rCtx != nil {
*r = *rCtx
}
var Params = NewXSSFrontParams()
if err := o.Context.BindValidRequest(r, route, &Params); err != nil { // bind params
o.Context.Respond(rw, r, route.Produces, route, err)
return
}
res := o.Handler.Handle(Params) // actually handle the request
o.Context.Respond(rw, r, route.Produces, route, res)
}