mirror of
				https://github.com/go-gitea/gitea.git
				synced 2025-10-25 01:24:13 +02:00 
			
		
		
		
	Same perl replacement as https://github.com/go-gitea/gitea/pull/25686 but for 1.20 to ease future backporting.
		
			
				
	
	
		
			171 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			171 lines
		
	
	
		
			3.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| // Copyright 2020 The Gitea Authors. All rights reserved.
 | |
| // SPDX-License-Identifier: MIT
 | |
| 
 | |
| package session
 | |
| 
 | |
| import (
 | |
| 	"log"
 | |
| 	"sync"
 | |
| 
 | |
| 	"code.gitea.io/gitea/models/auth"
 | |
| 	"code.gitea.io/gitea/modules/timeutil"
 | |
| 
 | |
| 	"gitea.com/go-chi/session"
 | |
| )
 | |
| 
 | |
| // DBStore represents a session store implementation based on the DB.
 | |
| type DBStore struct {
 | |
| 	sid  string
 | |
| 	lock sync.RWMutex
 | |
| 	data map[any]any
 | |
| }
 | |
| 
 | |
| // NewDBStore creates and returns a DB session store.
 | |
| func NewDBStore(sid string, kv map[any]any) *DBStore {
 | |
| 	return &DBStore{
 | |
| 		sid:  sid,
 | |
| 		data: kv,
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // Set sets value to given key in session.
 | |
| func (s *DBStore) Set(key, val any) error {
 | |
| 	s.lock.Lock()
 | |
| 	defer s.lock.Unlock()
 | |
| 
 | |
| 	s.data[key] = val
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Get gets value by given key in session.
 | |
| func (s *DBStore) Get(key any) any {
 | |
| 	s.lock.RLock()
 | |
| 	defer s.lock.RUnlock()
 | |
| 
 | |
| 	return s.data[key]
 | |
| }
 | |
| 
 | |
| // Delete delete a key from session.
 | |
| func (s *DBStore) Delete(key any) error {
 | |
| 	s.lock.Lock()
 | |
| 	defer s.lock.Unlock()
 | |
| 
 | |
| 	delete(s.data, key)
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // ID returns current session ID.
 | |
| func (s *DBStore) ID() string {
 | |
| 	return s.sid
 | |
| }
 | |
| 
 | |
| // Release releases resource and save data to provider.
 | |
| func (s *DBStore) Release() error {
 | |
| 	// Skip encoding if the data is empty
 | |
| 	if len(s.data) == 0 {
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	data, err := session.EncodeGob(s.data)
 | |
| 	if err != nil {
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	return auth.UpdateSession(s.sid, data)
 | |
| }
 | |
| 
 | |
| // Flush deletes all session data.
 | |
| func (s *DBStore) Flush() error {
 | |
| 	s.lock.Lock()
 | |
| 	defer s.lock.Unlock()
 | |
| 
 | |
| 	s.data = make(map[any]any)
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // DBProvider represents a DB session provider implementation.
 | |
| type DBProvider struct {
 | |
| 	maxLifetime int64
 | |
| }
 | |
| 
 | |
| // Init initializes DB session provider.
 | |
| // connStr: username:password@protocol(address)/dbname?param=value
 | |
| func (p *DBProvider) Init(maxLifetime int64, connStr string) error {
 | |
| 	p.maxLifetime = maxLifetime
 | |
| 	return nil
 | |
| }
 | |
| 
 | |
| // Read returns raw session store by session ID.
 | |
| func (p *DBProvider) Read(sid string) (session.RawStore, error) {
 | |
| 	s, err := auth.ReadSession(sid)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	var kv map[any]any
 | |
| 	if len(s.Data) == 0 || s.Expiry.Add(p.maxLifetime) <= timeutil.TimeStampNow() {
 | |
| 		kv = make(map[any]any)
 | |
| 	} else {
 | |
| 		kv, err = session.DecodeGob(s.Data)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return NewDBStore(sid, kv), nil
 | |
| }
 | |
| 
 | |
| // Exist returns true if session with given ID exists.
 | |
| func (p *DBProvider) Exist(sid string) bool {
 | |
| 	has, err := auth.ExistSession(sid)
 | |
| 	if err != nil {
 | |
| 		panic("session/DB: error checking existence: " + err.Error())
 | |
| 	}
 | |
| 	return has
 | |
| }
 | |
| 
 | |
| // Destroy deletes a session by session ID.
 | |
| func (p *DBProvider) Destroy(sid string) error {
 | |
| 	return auth.DestroySession(sid)
 | |
| }
 | |
| 
 | |
| // Regenerate regenerates a session store from old session ID to new one.
 | |
| func (p *DBProvider) Regenerate(oldsid, sid string) (_ session.RawStore, err error) {
 | |
| 	s, err := auth.RegenerateSession(oldsid, sid)
 | |
| 	if err != nil {
 | |
| 		return nil, err
 | |
| 	}
 | |
| 
 | |
| 	var kv map[any]any
 | |
| 	if len(s.Data) == 0 || s.Expiry.Add(p.maxLifetime) <= timeutil.TimeStampNow() {
 | |
| 		kv = make(map[any]any)
 | |
| 	} else {
 | |
| 		kv, err = session.DecodeGob(s.Data)
 | |
| 		if err != nil {
 | |
| 			return nil, err
 | |
| 		}
 | |
| 	}
 | |
| 
 | |
| 	return NewDBStore(sid, kv), nil
 | |
| }
 | |
| 
 | |
| // Count counts and returns number of sessions.
 | |
| func (p *DBProvider) Count() int {
 | |
| 	total, err := auth.CountSessions()
 | |
| 	if err != nil {
 | |
| 		panic("session/DB: error counting records: " + err.Error())
 | |
| 	}
 | |
| 	return int(total)
 | |
| }
 | |
| 
 | |
| // GC calls GC to clean expired sessions.
 | |
| func (p *DBProvider) GC() {
 | |
| 	if err := auth.CleanupSessions(p.maxLifetime); err != nil {
 | |
| 		log.Printf("session/DB: error garbage collecting: %v", err)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| func init() {
 | |
| 	session.Register("db", &DBProvider{})
 | |
| }
 |