1
0
mirror of https://github.com/astaxie/beego.git synced 2024-11-16 16:10:55 +00:00
Beego/session/sess_cookie.go

179 lines
4.7 KiB
Go
Raw Normal View History

2014-08-18 08:41:43 +00:00
// Copyright 2014 beego Author. All Rights Reserved.
2014-07-03 15:40:21 +00:00
//
2014-08-18 08:41:43 +00:00
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
2014-07-03 15:40:21 +00:00
//
2014-08-18 08:41:43 +00:00
// http://www.apache.org/licenses/LICENSE-2.0
2014-07-03 15:40:21 +00:00
//
2014-08-18 08:41:43 +00:00
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
2014-01-05 06:48:36 +00:00
package session
import (
"crypto/aes"
"crypto/cipher"
"encoding/json"
"net/http"
"net/url"
"sync"
)
var cookiepder = &CookieProvider{}
2015-09-12 14:53:55 +00:00
// CookieSessionStore Cookie SessionStore
2014-01-05 06:48:36 +00:00
type CookieSessionStore struct {
sid string
values map[interface{}]interface{} // session data
2014-01-05 06:48:36 +00:00
lock sync.RWMutex
}
// Set value to cookie session.
// the value are encoded as gob with hash block string.
2014-01-05 06:48:36 +00:00
func (st *CookieSessionStore) Set(key, value interface{}) error {
st.lock.Lock()
defer st.lock.Unlock()
st.values[key] = value
return nil
}
// Get value from cookie session
2014-01-05 06:48:36 +00:00
func (st *CookieSessionStore) Get(key interface{}) interface{} {
st.lock.RLock()
defer st.lock.RUnlock()
if v, ok := st.values[key]; ok {
return v
}
2015-09-12 14:53:55 +00:00
return nil
2014-01-05 06:48:36 +00:00
}
// Delete value in cookie session
2014-01-05 06:48:36 +00:00
func (st *CookieSessionStore) Delete(key interface{}) error {
st.lock.Lock()
defer st.lock.Unlock()
delete(st.values, key)
return nil
}
2015-09-12 14:53:55 +00:00
// Flush Clean all values in cookie session
2014-01-05 06:48:36 +00:00
func (st *CookieSessionStore) Flush() error {
st.lock.Lock()
defer st.lock.Unlock()
st.values = make(map[interface{}]interface{})
return nil
}
2015-09-12 14:53:55 +00:00
// SessionID Return id of this cookie session
2014-01-05 06:48:36 +00:00
func (st *CookieSessionStore) SessionID() string {
return st.sid
}
2015-09-12 14:53:55 +00:00
// SessionRelease Write cookie session to http response cookie
2014-01-05 06:48:36 +00:00
func (st *CookieSessionStore) SessionRelease(w http.ResponseWriter) {
encodedCookie, err := encodeCookie(cookiepder.block, cookiepder.config.SecurityKey, cookiepder.config.SecurityName, st.values)
if err == nil {
cookie := &http.Cookie{Name: cookiepder.config.CookieName,
Value: url.QueryEscape(encodedCookie),
Path: "/",
HttpOnly: true,
Secure: cookiepder.config.Secure,
MaxAge: cookiepder.config.Maxage}
http.SetCookie(w, cookie)
2014-01-05 06:48:36 +00:00
}
}
type cookieConfig struct {
SecurityKey string `json:"securityKey"`
BlockKey string `json:"blockKey"`
SecurityName string `json:"securityName"`
CookieName string `json:"cookieName"`
Secure bool `json:"secure"`
Maxage int `json:"maxage"`
}
2015-09-12 14:53:55 +00:00
// CookieProvider Cookie session provider
2014-01-05 06:48:36 +00:00
type CookieProvider struct {
maxlifetime int64
config *cookieConfig
block cipher.Block
}
2015-09-12 14:53:55 +00:00
// SessionInit Init cookie session provider with max lifetime and config json.
// maxlifetime is ignored.
// json config:
// securityKey - hash string
// blockKey - gob encode hash string. it's saved as aes crypto.
// securityName - recognized name in encoded cookie string
// cookieName - cookie name
// maxage - cookie max life time.
2014-01-05 06:48:36 +00:00
func (pder *CookieProvider) SessionInit(maxlifetime int64, config string) error {
pder.config = &cookieConfig{}
err := json.Unmarshal([]byte(config), pder.config)
if err != nil {
return err
}
if pder.config.BlockKey == "" {
pder.config.BlockKey = string(generateRandomKey(16))
}
if pder.config.SecurityName == "" {
pder.config.SecurityName = string(generateRandomKey(20))
}
pder.block, err = aes.NewCipher([]byte(pder.config.BlockKey))
if err != nil {
return err
}
2014-03-26 05:51:35 +00:00
pder.maxlifetime = maxlifetime
2014-01-05 06:48:36 +00:00
return nil
}
2015-09-12 14:53:55 +00:00
// SessionRead Get SessionStore in cooke.
// decode cooke string to map and put into SessionStore with sid.
2015-09-12 14:53:55 +00:00
func (pder *CookieProvider) SessionRead(sid string) (Store, error) {
2014-01-08 15:24:31 +00:00
maps, _ := decodeCookie(pder.block,
2014-01-05 06:48:36 +00:00
pder.config.SecurityKey,
pder.config.SecurityName,
sid, pder.maxlifetime)
2014-01-08 15:24:31 +00:00
if maps == nil {
maps = make(map[interface{}]interface{})
}
rs := &CookieSessionStore{sid: sid, values: maps}
2014-01-05 06:48:36 +00:00
return rs, nil
}
2015-09-12 14:53:55 +00:00
// SessionExist Cookie session is always existed
2014-01-05 06:48:36 +00:00
func (pder *CookieProvider) SessionExist(sid string) bool {
return true
}
2015-09-12 14:53:55 +00:00
// SessionRegenerate Implement method, no used.
func (pder *CookieProvider) SessionRegenerate(oldsid, sid string) (Store, error) {
2014-01-05 06:48:36 +00:00
return nil, nil
}
2015-09-12 14:53:55 +00:00
// SessionDestroy Implement method, no used.
2014-01-05 06:48:36 +00:00
func (pder *CookieProvider) SessionDestroy(sid string) error {
return nil
}
2015-09-12 14:53:55 +00:00
// SessionGC Implement method, no used.
2014-01-05 06:48:36 +00:00
func (pder *CookieProvider) SessionGC() {
}
2015-09-12 14:53:55 +00:00
// SessionAll Implement method, return 0.
2014-01-05 06:48:36 +00:00
func (pder *CookieProvider) SessionAll() int {
return 0
}
2015-09-12 14:53:55 +00:00
// SessionUpdate Implement method, no used.
2014-01-05 06:48:36 +00:00
func (pder *CookieProvider) SessionUpdate(sid string) error {
return nil
}
func init() {
Register("cookie", cookiepder)
}