123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360 |
- // Copyright 2014 beego Author. All Rights Reserved.
- //
- // Licensed under the Apache License, Version 2.0 (the "License");
- // you may not use this file except in compliance with the License.
- // You may obtain a copy of the License at
- //
- // http://www.apache.org/licenses/LICENSE-2.0
- //
- // Unless required by applicable law or agreed to in writing, software
- // distributed under the License is distributed on an "AS IS" BASIS,
- // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- // See the License for the specific language governing permissions and
- // limitations under the License.
- // Package session provider
- //
- // Usage:
- // import(
- // "github.com/astaxie/beego/session"
- // )
- //
- // func init() {
- // globalSessions, _ = session.NewManager("memory", `{"cookieName":"gosessionid", "enableSetCookie,omitempty": true, "gclifetime":3600, "maxLifetime": 3600, "secure": false, "cookieLifeTime": 3600, "providerConfig": ""}`)
- // go globalSessions.GC()
- // }
- //
- // more docs: http://beego.me/docs/module/session.md
- package session
- import (
- "crypto/rand"
- "encoding/hex"
- "errors"
- "fmt"
- "io"
- "log"
- "net/http"
- "net/textproto"
- "net/url"
- "os"
- "time"
- )
- // Store contains all data for one session process with specific id.
- type Store interface {
- Set(key, value interface{}) error //set session value
- Get(key interface{}) interface{} //get session value
- Delete(key interface{}) error //delete session value
- SessionID() string //back current sessionID
- SessionRelease(w http.ResponseWriter) // release the resource & save data to provider & return the data
- Flush() error //delete all data
- }
- // Provider contains global session methods and saved SessionStores.
- // it can operate a SessionStore by its id.
- type Provider interface {
- SessionInit(gclifetime int64, config string) error
- SessionRead(sid string) (Store, error)
- SessionExist(sid string) bool
- SessionRegenerate(oldsid, sid string) (Store, error)
- SessionDestroy(sid string) error
- SessionAll() int //get all active session
- SessionGC()
- }
- var provides = make(map[string]Provider)
- // SLogger a helpful variable to log information about session
- var SLogger = NewSessionLog(os.Stderr)
- // Register makes a session provide available by the provided name.
- // If Register is called twice with the same name or if driver is nil,
- // it panics.
- func Register(name string, provide Provider) {
- if provide == nil {
- panic("session: Register provide is nil")
- }
- if _, dup := provides[name]; dup {
- panic("session: Register called twice for provider " + name)
- }
- provides[name] = provide
- }
- type ManagerConfig struct {
- CookieName string `json:"cookieName"`
- EnableSetCookie bool `json:"enableSetCookie,omitempty"`
- Gclifetime int64 `json:"gclifetime"`
- Maxlifetime int64 `json:"maxLifetime"`
- DisableHTTPOnly bool `json:"disableHTTPOnly"`
- Secure bool `json:"secure"`
- CookieLifeTime int `json:"cookieLifeTime"`
- ProviderConfig string `json:"providerConfig"`
- Domain string `json:"domain"`
- SessionIDLength int64 `json:"sessionIDLength"`
- EnableSidInHttpHeader bool `json:"enableSidInHttpHeader"`
- SessionNameInHttpHeader string `json:"sessionNameInHttpHeader"`
- EnableSidInUrlQuery bool `json:"enableSidInUrlQuery"`
- }
- // Manager contains Provider and its configuration.
- type Manager struct {
- provider Provider
- config *ManagerConfig
- }
- // NewManager Create new Manager with provider name and json config string.
- // provider name:
- // 1. cookie
- // 2. file
- // 3. memory
- // 4. redis
- // 5. mysql
- // json config:
- // 1. is https default false
- // 2. hashfunc default sha1
- // 3. hashkey default beegosessionkey
- // 4. maxage default is none
- func NewManager(provideName string, cf *ManagerConfig) (*Manager, error) {
- provider, ok := provides[provideName]
- if !ok {
- return nil, fmt.Errorf("session: unknown provide %q (forgotten import?)", provideName)
- }
- if cf.Maxlifetime == 0 {
- cf.Maxlifetime = cf.Gclifetime
- }
- if cf.EnableSidInHttpHeader {
- if cf.SessionNameInHttpHeader == "" {
- panic(errors.New("SessionNameInHttpHeader is empty"))
- }
- strMimeHeader := textproto.CanonicalMIMEHeaderKey(cf.SessionNameInHttpHeader)
- if cf.SessionNameInHttpHeader != strMimeHeader {
- strErrMsg := "SessionNameInHttpHeader (" + cf.SessionNameInHttpHeader + ") has the wrong format, it should be like this : " + strMimeHeader
- panic(errors.New(strErrMsg))
- }
- }
- err := provider.SessionInit(cf.Maxlifetime, cf.ProviderConfig)
- if err != nil {
- return nil, err
- }
- if cf.SessionIDLength == 0 {
- cf.SessionIDLength = 16
- }
- return &Manager{
- provider,
- cf,
- }, nil
- }
- // getSid retrieves session identifier from HTTP Request.
- // First try to retrieve id by reading from cookie, session cookie name is configurable,
- // if not exist, then retrieve id from querying parameters.
- //
- // error is not nil when there is anything wrong.
- // sid is empty when need to generate a new session id
- // otherwise return an valid session id.
- func (manager *Manager) getSid(r *http.Request) (string, error) {
- cookie, errs := r.Cookie(manager.config.CookieName)
- if errs != nil || cookie.Value == "" {
- var sid string
- if manager.config.EnableSidInUrlQuery {
- errs := r.ParseForm()
- if errs != nil {
- return "", errs
- }
- sid = r.FormValue(manager.config.CookieName)
- }
- // if not found in Cookie / param, then read it from request headers
- if manager.config.EnableSidInHttpHeader && sid == "" {
- sids, isFound := r.Header[manager.config.SessionNameInHttpHeader]
- if isFound && len(sids) != 0 {
- return sids[0], nil
- }
- }
- return sid, nil
- }
- // HTTP Request contains cookie for sessionid info.
- return url.QueryUnescape(cookie.Value)
- }
- // SessionStart generate or read the session id from http request.
- // if session id exists, return SessionStore with this id.
- func (manager *Manager) SessionStart(w http.ResponseWriter, r *http.Request) (session Store, err error) {
- sid, errs := manager.getSid(r)
- if errs != nil {
- return nil, errs
- }
- if sid != "" && manager.provider.SessionExist(sid) {
- return manager.provider.SessionRead(sid)
- }
- // Generate a new session
- sid, errs = manager.sessionID()
- if errs != nil {
- return nil, errs
- }
- session, err = manager.provider.SessionRead(sid)
- if err != nil {
- return nil, err
- }
- cookie := &http.Cookie{
- Name: manager.config.CookieName,
- Value: url.QueryEscape(sid),
- Path: "/",
- HttpOnly: !manager.config.DisableHTTPOnly,
- Secure: manager.isSecure(r),
- Domain: manager.config.Domain,
- }
- if manager.config.CookieLifeTime > 0 {
- cookie.MaxAge = manager.config.CookieLifeTime
- cookie.Expires = time.Now().Add(time.Duration(manager.config.CookieLifeTime) * time.Second)
- }
- if manager.config.EnableSetCookie {
- http.SetCookie(w, cookie)
- }
- r.AddCookie(cookie)
- if manager.config.EnableSidInHttpHeader {
- r.Header.Set(manager.config.SessionNameInHttpHeader, sid)
- w.Header().Set(manager.config.SessionNameInHttpHeader, sid)
- }
- return
- }
- // SessionDestroy Destroy session by its id in http request cookie.
- func (manager *Manager) SessionDestroy(w http.ResponseWriter, r *http.Request) {
- if manager.config.EnableSidInHttpHeader {
- r.Header.Del(manager.config.SessionNameInHttpHeader)
- w.Header().Del(manager.config.SessionNameInHttpHeader)
- }
- cookie, err := r.Cookie(manager.config.CookieName)
- if err != nil || cookie.Value == "" {
- return
- }
- sid, _ := url.QueryUnescape(cookie.Value)
- manager.provider.SessionDestroy(sid)
- if manager.config.EnableSetCookie {
- expiration := time.Now()
- cookie = &http.Cookie{Name: manager.config.CookieName,
- Path: "/",
- HttpOnly: !manager.config.DisableHTTPOnly,
- Expires: expiration,
- MaxAge: -1}
- http.SetCookie(w, cookie)
- }
- }
- // GetSessionStore Get SessionStore by its id.
- func (manager *Manager) GetSessionStore(sid string) (sessions Store, err error) {
- sessions, err = manager.provider.SessionRead(sid)
- return
- }
- // GC Start session gc process.
- // it can do gc in times after gc lifetime.
- func (manager *Manager) GC() {
- manager.provider.SessionGC()
- time.AfterFunc(time.Duration(manager.config.Gclifetime)*time.Second, func() { manager.GC() })
- }
- // SessionRegenerateID Regenerate a session id for this SessionStore who's id is saving in http request.
- func (manager *Manager) SessionRegenerateID(w http.ResponseWriter, r *http.Request) (session Store) {
- sid, err := manager.sessionID()
- if err != nil {
- return
- }
- cookie, err := r.Cookie(manager.config.CookieName)
- if err != nil || cookie.Value == "" {
- //delete old cookie
- session, _ = manager.provider.SessionRead(sid)
- cookie = &http.Cookie{Name: manager.config.CookieName,
- Value: url.QueryEscape(sid),
- Path: "/",
- HttpOnly: !manager.config.DisableHTTPOnly,
- Secure: manager.isSecure(r),
- Domain: manager.config.Domain,
- }
- } else {
- oldsid, _ := url.QueryUnescape(cookie.Value)
- session, _ = manager.provider.SessionRegenerate(oldsid, sid)
- cookie.Value = url.QueryEscape(sid)
- cookie.HttpOnly = true
- cookie.Path = "/"
- }
- if manager.config.CookieLifeTime > 0 {
- cookie.MaxAge = manager.config.CookieLifeTime
- cookie.Expires = time.Now().Add(time.Duration(manager.config.CookieLifeTime) * time.Second)
- }
- if manager.config.EnableSetCookie {
- http.SetCookie(w, cookie)
- }
- r.AddCookie(cookie)
- if manager.config.EnableSidInHttpHeader {
- r.Header.Set(manager.config.SessionNameInHttpHeader, sid)
- w.Header().Set(manager.config.SessionNameInHttpHeader, sid)
- }
- return
- }
- // GetActiveSession Get all active sessions count number.
- func (manager *Manager) GetActiveSession() int {
- return manager.provider.SessionAll()
- }
- // SetSecure Set cookie with https.
- func (manager *Manager) SetSecure(secure bool) {
- manager.config.Secure = secure
- }
- func (manager *Manager) sessionID() (string, error) {
- b := make([]byte, manager.config.SessionIDLength)
- n, err := rand.Read(b)
- if n != len(b) || err != nil {
- return "", fmt.Errorf("Could not successfully read from the system CSPRNG.")
- }
- return hex.EncodeToString(b), nil
- }
- // Set cookie with https.
- func (manager *Manager) isSecure(req *http.Request) bool {
- if !manager.config.Secure {
- return false
- }
- if req.URL.Scheme != "" {
- return req.URL.Scheme == "https"
- }
- if req.TLS == nil {
- return false
- }
- return true
- }
- // Log implement the log.Logger
- type Log struct {
- *log.Logger
- }
- // NewSessionLog set io.Writer to create a Logger for session.
- func NewSessionLog(out io.Writer) *Log {
- sl := new(Log)
- sl.Logger = log.New(out, "[SESSION]", 1e9)
- return sl
- }
|