| 1 | import cPickle |
|---|
| 2 | import Cookie |
|---|
| 3 | import hmac |
|---|
| 4 | import os |
|---|
| 5 | import random |
|---|
| 6 | import time |
|---|
| 7 | from datetime import datetime, timedelta |
|---|
| 8 | try: |
|---|
| 9 | from hashlib import md5 |
|---|
| 10 | except ImportError: |
|---|
| 11 | from md5 import md5 |
|---|
| 12 | try: |
|---|
| 13 | # Use PyCrypto (if available) |
|---|
| 14 | from Crypto.Hash import HMAC, SHA as SHA1 |
|---|
| 15 | |
|---|
| 16 | except ImportError: |
|---|
| 17 | # PyCrypto not available. Use the Python standard library. |
|---|
| 18 | import hmac as HMAC |
|---|
| 19 | import sys |
|---|
| 20 | # When using the stdlib, we have to make sure the hmac version and sha |
|---|
| 21 | # version are compatible |
|---|
| 22 | if sys.version_info[0:2] <= (2,4): |
|---|
| 23 | # hmac in python2.4 or less require the sha module |
|---|
| 24 | import sha as SHA1 |
|---|
| 25 | else: |
|---|
| 26 | # NOTE: We have to use the callable with hashlib (hashlib.sha1), |
|---|
| 27 | # otherwise hmac only accepts the sha module object itself |
|---|
| 28 | from hashlib import sha1 as SHA1 |
|---|
| 29 | |
|---|
| 30 | # Check for pycryptopp encryption for AES |
|---|
| 31 | try: |
|---|
| 32 | from beaker.crypto import generateCryptoKeys, aesEncrypt |
|---|
| 33 | crypto_ok = True |
|---|
| 34 | except: |
|---|
| 35 | crypto_ok = False |
|---|
| 36 | |
|---|
| 37 | from beaker.cache import clsmap |
|---|
| 38 | from beaker.exceptions import BeakerException |
|---|
| 39 | from beaker.util import b64decode, b64encode, Set |
|---|
| 40 | |
|---|
| 41 | __all__ = ['SignedCookie', 'Session'] |
|---|
| 42 | |
|---|
| 43 | getpid = hasattr(os, 'getpid') and os.getpid or (lambda : '') |
|---|
| 44 | |
|---|
| 45 | class SignedCookie(Cookie.BaseCookie): |
|---|
| 46 | """Extends python cookie to give digital signature support""" |
|---|
| 47 | def __init__(self, secret, input=None): |
|---|
| 48 | self.secret = secret |
|---|
| 49 | Cookie.BaseCookie.__init__(self, input) |
|---|
| 50 | |
|---|
| 51 | def value_decode(self, val): |
|---|
| 52 | val = val.strip('"') |
|---|
| 53 | sig = HMAC.new(self.secret, val[40:], SHA1).hexdigest() |
|---|
| 54 | if sig != val[:40]: |
|---|
| 55 | return None, val |
|---|
| 56 | else: |
|---|
| 57 | return val[40:], val |
|---|
| 58 | |
|---|
| 59 | def value_encode(self, val): |
|---|
| 60 | sig = HMAC.new(self.secret, val, SHA1).hexdigest() |
|---|
| 61 | return str(val), ("%s%s" % (sig, val)) |
|---|
| 62 | |
|---|
| 63 | |
|---|
| 64 | class Session(dict): |
|---|
| 65 | """Session object that uses container package for storage""" |
|---|
| 66 | def __init__(self, request, id=None, invalidate_corrupt=False, |
|---|
| 67 | use_cookies=True, type=None, data_dir=None, |
|---|
| 68 | key='beaker.session.id', timeout=None, cookie_expires=True, |
|---|
| 69 | cookie_domain=None, secret=None, secure=False, |
|---|
| 70 | namespace_class=None, **namespace_args): |
|---|
| 71 | if not type: |
|---|
| 72 | if data_dir: |
|---|
| 73 | self.type = 'file' |
|---|
| 74 | else: |
|---|
| 75 | self.type = 'memory' |
|---|
| 76 | else: |
|---|
| 77 | self.type = type |
|---|
| 78 | |
|---|
| 79 | self.namespace_class = namespace_class or clsmap[self.type] |
|---|
| 80 | |
|---|
| 81 | self.namespace_args = namespace_args |
|---|
| 82 | |
|---|
| 83 | self.request = request |
|---|
| 84 | self.data_dir = data_dir |
|---|
| 85 | self.key = key |
|---|
| 86 | |
|---|
| 87 | self.timeout = timeout |
|---|
| 88 | self.use_cookies = use_cookies |
|---|
| 89 | self.cookie_expires = cookie_expires |
|---|
| 90 | |
|---|
| 91 | # Default cookie domain/path |
|---|
| 92 | self._domain = cookie_domain |
|---|
| 93 | self._path = '/' |
|---|
| 94 | self.was_invalidated = False |
|---|
| 95 | self.secret = secret |
|---|
| 96 | self.secure = secure |
|---|
| 97 | self.id = id |
|---|
| 98 | self.accessed_dict = {} |
|---|
| 99 | |
|---|
| 100 | if self.use_cookies: |
|---|
| 101 | cookieheader = request.get('cookie', '') |
|---|
| 102 | if secret: |
|---|
| 103 | try: |
|---|
| 104 | self.cookie = SignedCookie(secret, input=cookieheader) |
|---|
| 105 | except Cookie.CookieError: |
|---|
| 106 | self.cookie = SignedCookie(secret, input=None) |
|---|
| 107 | else: |
|---|
| 108 | self.cookie = Cookie.SimpleCookie(input=cookieheader) |
|---|
| 109 | |
|---|
| 110 | if not self.id and self.key in self.cookie: |
|---|
| 111 | self.id = self.cookie[self.key].value |
|---|
| 112 | |
|---|
| 113 | self.is_new = self.id is None |
|---|
| 114 | if self.is_new: |
|---|
| 115 | self._create_id() |
|---|
| 116 | self['_accessed_time'] = self['_creation_time'] = time.time() |
|---|
| 117 | else: |
|---|
| 118 | try: |
|---|
| 119 | self.load() |
|---|
| 120 | except: |
|---|
| 121 | if invalidate_corrupt: |
|---|
| 122 | self.invalidate() |
|---|
| 123 | else: |
|---|
| 124 | raise |
|---|
| 125 | |
|---|
| 126 | def _create_id(self): |
|---|
| 127 | self.id = md5( |
|---|
| 128 | md5("%f%s%f%s" % (time.time(), id({}), random.random(), |
|---|
| 129 | getpid())).hexdigest(), |
|---|
| 130 | ).hexdigest() |
|---|
| 131 | self.is_new = True |
|---|
| 132 | self.last_accessed = None |
|---|
| 133 | if self.use_cookies: |
|---|
| 134 | self.cookie[self.key] = self.id |
|---|
| 135 | if self._domain: |
|---|
| 136 | self.cookie[self.key]['domain'] = self._domain |
|---|
| 137 | if self.secure: |
|---|
| 138 | self.cookie[self.key]['secure'] = True |
|---|
| 139 | self.cookie[self.key]['path'] = self._path |
|---|
| 140 | if self.cookie_expires is not True: |
|---|
| 141 | if self.cookie_expires is False: |
|---|
| 142 | expires = datetime.fromtimestamp( 0x7FFFFFFF ) |
|---|
| 143 | elif isinstance(self.cookie_expires, timedelta): |
|---|
| 144 | expires = datetime.today() + self.cookie_expires |
|---|
| 145 | elif isinstance(self.cookie_expires, datetime): |
|---|
| 146 | expires = self.cookie_expires |
|---|
| 147 | else: |
|---|
| 148 | raise ValueError("Invalid argument for cookie_expires: %s" |
|---|
| 149 | % repr(self.cookie_expires)) |
|---|
| 150 | self.cookie[self.key]['expires'] = \ |
|---|
| 151 | expires.strftime("%a, %d-%b-%Y %H:%M:%S GMT" ) |
|---|
| 152 | self.request['cookie_out'] = self.cookie[self.key].output(header='') |
|---|
| 153 | self.request['set_cookie'] = False |
|---|
| 154 | |
|---|
| 155 | def created(self): |
|---|
| 156 | return self['_creation_time'] |
|---|
| 157 | created = property(created) |
|---|
| 158 | |
|---|
| 159 | def _set_domain(self, domain): |
|---|
| 160 | self['_domain'] = domain |
|---|
| 161 | self.cookie[self.key]['domain'] = domain |
|---|
| 162 | self.request['cookie_out'] = self.cookie[self.key].output(header='') |
|---|
| 163 | self.request['set_cookie'] = True |
|---|
| 164 | |
|---|
| 165 | def _get_domain(self, domain): |
|---|
| 166 | return self._domain |
|---|
| 167 | |
|---|
| 168 | domain = property(_get_domain, _set_domain) |
|---|
| 169 | |
|---|
| 170 | def _set_path(self, path): |
|---|
| 171 | self['_path'] = path |
|---|
| 172 | self.cookie[self.key]['path'] = path |
|---|
| 173 | self.request['cookie_out'] = self.cookie[self.key].output(header='') |
|---|
| 174 | self.request['set_cookie'] = True |
|---|
| 175 | |
|---|
| 176 | def _get_domain(self, domain): |
|---|
| 177 | return self._domain |
|---|
| 178 | |
|---|
| 179 | domain = property(_get_domain, _set_domain) |
|---|
| 180 | |
|---|
| 181 | def _delete_cookie(self): |
|---|
| 182 | self.request['set_cookie'] = True |
|---|
| 183 | self.cookie[self.key] = self.id |
|---|
| 184 | if self._domain: |
|---|
| 185 | self.cookie[self.key]['domain'] = self._domain |
|---|
| 186 | if self.secure: |
|---|
| 187 | self.cookie[self.key]['secure'] = True |
|---|
| 188 | self.cookie[self.key]['path'] = '/' |
|---|
| 189 | expires = datetime.today().replace(year=2003) |
|---|
| 190 | self.cookie[self.key]['expires'] = \ |
|---|
| 191 | expires.strftime("%a, %d-%b-%Y %H:%M:%S GMT" ) |
|---|
| 192 | self.request['cookie_out'] = self.cookie[self.key].output(header='') |
|---|
| 193 | self.request['set_cookie'] = True |
|---|
| 194 | |
|---|
| 195 | def delete(self): |
|---|
| 196 | """Deletes the session from the persistent storage, and sends |
|---|
| 197 | an expired cookie out""" |
|---|
| 198 | if self.use_cookies: |
|---|
| 199 | self._delete_cookie() |
|---|
| 200 | self.clear() |
|---|
| 201 | |
|---|
| 202 | def invalidate(self): |
|---|
| 203 | """Invalidates this session, creates a new session id, returns |
|---|
| 204 | to the is_new state""" |
|---|
| 205 | self.clear() |
|---|
| 206 | self.was_invalidated = True |
|---|
| 207 | self._create_id() |
|---|
| 208 | self.load() |
|---|
| 209 | |
|---|
| 210 | def load(self): |
|---|
| 211 | "Loads the data from this session from persistent storage" |
|---|
| 212 | self.namespace = self.namespace_class(self.id, |
|---|
| 213 | data_dir=self.data_dir, digest_filenames=False, |
|---|
| 214 | **self.namespace_args) |
|---|
| 215 | now = time.time() |
|---|
| 216 | self.request['set_cookie'] = True |
|---|
| 217 | |
|---|
| 218 | self.namespace.acquire_read_lock() |
|---|
| 219 | timed_out = False |
|---|
| 220 | try: |
|---|
| 221 | self.clear() |
|---|
| 222 | try: |
|---|
| 223 | session_data = self.namespace['session'] |
|---|
| 224 | |
|---|
| 225 | # Memcached always returns a key, its None when its not |
|---|
| 226 | # present |
|---|
| 227 | if session_data is None: |
|---|
| 228 | session_data = { |
|---|
| 229 | '_creation_time':now, |
|---|
| 230 | '_accessed_time':now |
|---|
| 231 | } |
|---|
| 232 | self.is_new = True |
|---|
| 233 | except (KeyError, TypeError): |
|---|
| 234 | session_data = { |
|---|
| 235 | '_creation_time':now, |
|---|
| 236 | '_accessed_time':now |
|---|
| 237 | } |
|---|
| 238 | self.is_new = True |
|---|
| 239 | |
|---|
| 240 | if self.timeout is not None and \ |
|---|
| 241 | now - session_data['_accessed_time'] > self.timeout: |
|---|
| 242 | timed_out= True |
|---|
| 243 | else: |
|---|
| 244 | # Properly set the last_accessed time, which is different |
|---|
| 245 | # than the *currently* _accessed_time |
|---|
| 246 | if self.is_new or '_accessed_time' not in session_data: |
|---|
| 247 | self.last_accessed = None |
|---|
| 248 | else: |
|---|
| 249 | self.last_accessed = session_data['_accessed_time'] |
|---|
| 250 | |
|---|
| 251 | # Update the current _accessed_time |
|---|
| 252 | session_data['_accessed_time'] = now |
|---|
| 253 | self.update(session_data) |
|---|
| 254 | self.accessed_dict = session_data.copy() |
|---|
| 255 | finally: |
|---|
| 256 | self.namespace.release_read_lock() |
|---|
| 257 | if timed_out: |
|---|
| 258 | self.invalidate() |
|---|
| 259 | |
|---|
| 260 | def save(self, accessed_only=False): |
|---|
| 261 | """Saves the data for this session to persistent storage |
|---|
| 262 | |
|---|
| 263 | If accessed_only is True, then only the original data loaded |
|---|
| 264 | at the beginning of the request will be saved, with the updated |
|---|
| 265 | last accessed time. |
|---|
| 266 | |
|---|
| 267 | """ |
|---|
| 268 | # Look to see if its a new session that was only accessed |
|---|
| 269 | # Don't save it under that case |
|---|
| 270 | if accessed_only and self.is_new: |
|---|
| 271 | return None |
|---|
| 272 | |
|---|
| 273 | if not hasattr(self, 'namespace'): |
|---|
| 274 | self.namespace = self.namespace_class( |
|---|
| 275 | self.id, |
|---|
| 276 | data_dir=self.data_dir, |
|---|
| 277 | digest_filenames=False, |
|---|
| 278 | **self.namespace_args) |
|---|
| 279 | |
|---|
| 280 | self.namespace.acquire_write_lock() |
|---|
| 281 | try: |
|---|
| 282 | if accessed_only: |
|---|
| 283 | data = dict(self.accessed_dict.items()) |
|---|
| 284 | else: |
|---|
| 285 | data = dict(self.items()) |
|---|
| 286 | |
|---|
| 287 | # Save the data |
|---|
| 288 | if not data and 'session' in self.namespace: |
|---|
| 289 | del self.namespace['session'] |
|---|
| 290 | else: |
|---|
| 291 | self.namespace['session'] = data |
|---|
| 292 | finally: |
|---|
| 293 | self.namespace.release_write_lock() |
|---|
| 294 | if self.is_new: |
|---|
| 295 | self.request['set_cookie'] = True |
|---|
| 296 | |
|---|
| 297 | def revert(self): |
|---|
| 298 | """Revert the session to its original state from its first |
|---|
| 299 | access in the request""" |
|---|
| 300 | self.clear() |
|---|
| 301 | self.update(self.accessed_dict) |
|---|
| 302 | |
|---|
| 303 | # TODO: I think both these methods should be removed. They're from |
|---|
| 304 | # the original mod_python code i was ripping off but they really |
|---|
| 305 | # have no use here. |
|---|
| 306 | def lock(self): |
|---|
| 307 | """Locks this session against other processes/threads. This is |
|---|
| 308 | automatic when load/save is called. |
|---|
| 309 | |
|---|
| 310 | ***use with caution*** and always with a corresponding 'unlock' |
|---|
| 311 | inside a "finally:" block, as a stray lock typically cannot be |
|---|
| 312 | unlocked without shutting down the whole application. |
|---|
| 313 | |
|---|
| 314 | """ |
|---|
| 315 | self.namespace.acquire_write_lock() |
|---|
| 316 | |
|---|
| 317 | def unlock(self): |
|---|
| 318 | """Unlocks this session against other processes/threads. This |
|---|
| 319 | is automatic when load/save is called. |
|---|
| 320 | |
|---|
| 321 | ***use with caution*** and always within a "finally:" block, as |
|---|
| 322 | a stray lock typically cannot be unlocked without shutting down |
|---|
| 323 | the whole application. |
|---|
| 324 | |
|---|
| 325 | """ |
|---|
| 326 | self.namespace.release_write_lock() |
|---|
| 327 | |
|---|
| 328 | class CookieSession(Session): |
|---|
| 329 | """Pure cookie-based session |
|---|
| 330 | |
|---|
| 331 | Options recognized when using cookie-based sessions are slightly |
|---|
| 332 | more restricted than general sessions. |
|---|
| 333 | |
|---|
| 334 | ``key`` |
|---|
| 335 | The name the cookie should be set to. |
|---|
| 336 | ``timeout`` |
|---|
| 337 | How long session data is considered valid. This is used |
|---|
| 338 | regardless of the cookie being present or not to determine |
|---|
| 339 | whether session data is still valid. |
|---|
| 340 | ``encrypt_key`` |
|---|
| 341 | The key to use for the session encryption, if not provided the |
|---|
| 342 | session will not be encrypted. |
|---|
| 343 | ``validate_key`` |
|---|
| 344 | The key used to sign the encrypted session |
|---|
| 345 | ``cookie_domain`` |
|---|
| 346 | Domain to use for the cookie. |
|---|
| 347 | ``secure`` |
|---|
| 348 | Whether or not the cookie should only be sent over SSL. |
|---|
| 349 | |
|---|
| 350 | """ |
|---|
| 351 | def __init__(self, request, key='beaker.session.id', timeout=None, |
|---|
| 352 | cookie_expires=True, cookie_domain=None, encrypt_key=None, |
|---|
| 353 | validate_key=None, secure=False, **kwargs): |
|---|
| 354 | if not crypto_ok and encrypt_key: |
|---|
| 355 | raise BeakerException("pycryptopp is not installed, can't use " |
|---|
| 356 | "encrypted cookie-only Session.") |
|---|
| 357 | |
|---|
| 358 | self.request = request |
|---|
| 359 | self.key = key |
|---|
| 360 | self.timeout = timeout |
|---|
| 361 | self.cookie_expires = cookie_expires |
|---|
| 362 | self.encrypt_key = encrypt_key |
|---|
| 363 | self.validate_key = validate_key |
|---|
| 364 | self.request['set_cookie'] = False |
|---|
| 365 | self.secure = secure |
|---|
| 366 | self._domain = cookie_domain |
|---|
| 367 | self._path = '/' |
|---|
| 368 | |
|---|
| 369 | try: |
|---|
| 370 | cookieheader = request['cookie'] |
|---|
| 371 | except KeyError: |
|---|
| 372 | cookieheader = '' |
|---|
| 373 | |
|---|
| 374 | if validate_key is None: |
|---|
| 375 | raise BeakerException("No validate_key specified for Cookie only " |
|---|
| 376 | "Session.") |
|---|
| 377 | |
|---|
| 378 | try: |
|---|
| 379 | self.cookie = SignedCookie(validate_key, input=cookieheader) |
|---|
| 380 | except Cookie.CookieError: |
|---|
| 381 | self.cookie = SignedCookie(validate_key, input=None) |
|---|
| 382 | |
|---|
| 383 | self['_id'] = self._make_id() |
|---|
| 384 | self.is_new = True |
|---|
| 385 | |
|---|
| 386 | # If we have a cookie, load it |
|---|
| 387 | if self.key in self.cookie and self.cookie[self.key].value is not None: |
|---|
| 388 | self.is_new = False |
|---|
| 389 | try: |
|---|
| 390 | self.update(self._decrypt_data()) |
|---|
| 391 | except: |
|---|
| 392 | pass |
|---|
| 393 | if self.timeout is not None and time.time() - \ |
|---|
| 394 | self['_accessed_time'] > self.timeout: |
|---|
| 395 | self.clear() |
|---|
| 396 | self.accessed_dict = self.copy() |
|---|
| 397 | self._create_cookie() |
|---|
| 398 | |
|---|
| 399 | def created(self): |
|---|
| 400 | return self['_creation_time'] |
|---|
| 401 | created = property(created) |
|---|
| 402 | |
|---|
| 403 | def id(self): |
|---|
| 404 | return self['_id'] |
|---|
| 405 | id = property(id) |
|---|
| 406 | |
|---|
| 407 | def _set_domain(self, domain): |
|---|
| 408 | self['_domain'] = domain |
|---|
| 409 | self._domain = domain |
|---|
| 410 | |
|---|
| 411 | def _set_path(self, path): |
|---|
| 412 | self['_path'] = path |
|---|
| 413 | self._path = path |
|---|
| 414 | |
|---|
| 415 | def _encrypt_data(self): |
|---|
| 416 | """Serialize, encipher, and base64 the session dict""" |
|---|
| 417 | if self.encrypt_key: |
|---|
| 418 | nonce = b64encode(os.urandom(40))[:8] |
|---|
| 419 | encrypt_key = generateCryptoKeys(self.encrypt_key, |
|---|
| 420 | self.validate_key + nonce, 1) |
|---|
| 421 | data = cPickle.dumps(self.copy(), 2) |
|---|
| 422 | return nonce + b64encode(aesEncrypt(data, encrypt_key)) |
|---|
| 423 | else: |
|---|
| 424 | data = cPickle.dumps(self.copy(), 2) |
|---|
| 425 | return b64encode(data) |
|---|
| 426 | |
|---|
| 427 | def _decrypt_data(self): |
|---|
| 428 | """Bas64, decipher, then un-serialize the data for the session |
|---|
| 429 | dict""" |
|---|
| 430 | if self.encrypt_key: |
|---|
| 431 | nonce = self.cookie[self.key].value[:8] |
|---|
| 432 | encrypt_key = generateCryptoKeys(self.encrypt_key, |
|---|
| 433 | self.validate_key + nonce, 1) |
|---|
| 434 | payload = b64decode(self.cookie[self.key].value[8:]) |
|---|
| 435 | data = aesEncrypt(payload, encrypt_key) |
|---|
| 436 | return cPickle.loads(data) |
|---|
| 437 | else: |
|---|
| 438 | data = b64decode(self.cookie[self.key].value) |
|---|
| 439 | return cPickle.loads(data) |
|---|
| 440 | |
|---|
| 441 | def _make_id(self): |
|---|
| 442 | return md5(md5( |
|---|
| 443 | "%f%s%f%d" % (time.time(), id({}), random.random(), getpid()) |
|---|
| 444 | ).hexdigest() |
|---|
| 445 | ).hexdigest() |
|---|
| 446 | |
|---|
| 447 | def save(self, accessed_only=False): |
|---|
| 448 | """Saves the data for this session to persistent storage""" |
|---|
| 449 | if accessed_only and self.is_new: |
|---|
| 450 | return |
|---|
| 451 | if accessed_only: |
|---|
| 452 | self.clear() |
|---|
| 453 | self.update(self.accessed_dict) |
|---|
| 454 | self._create_cookie() |
|---|
| 455 | |
|---|
| 456 | def expire(self): |
|---|
| 457 | """Delete the 'expires' attribute on this Session, if any.""" |
|---|
| 458 | |
|---|
| 459 | self.pop('_expires', None) |
|---|
| 460 | |
|---|
| 461 | def _create_cookie(self): |
|---|
| 462 | if '_creation_time' not in self: |
|---|
| 463 | self['_creation_time'] = time.time() |
|---|
| 464 | if '_id' not in self: |
|---|
| 465 | self['_id'] = self._make_id() |
|---|
| 466 | self['_accessed_time'] = time.time() |
|---|
| 467 | |
|---|
| 468 | if self.cookie_expires is not True: |
|---|
| 469 | if self.cookie_expires is False: |
|---|
| 470 | expires = datetime.fromtimestamp( 0x7FFFFFFF ) |
|---|
| 471 | elif isinstance(self.cookie_expires, timedelta): |
|---|
| 472 | expires = datetime.today() + self.cookie_expires |
|---|
| 473 | elif isinstance(self.cookie_expires, datetime): |
|---|
| 474 | expires = self.cookie_expires |
|---|
| 475 | else: |
|---|
| 476 | raise ValueError("Invalid argument for cookie_expires: %s" |
|---|
| 477 | % repr(self.cookie_expires)) |
|---|
| 478 | self['_expires'] = expires |
|---|
| 479 | elif '_expires' in self: |
|---|
| 480 | expires = self['_expires'] |
|---|
| 481 | else: |
|---|
| 482 | expires = None |
|---|
| 483 | |
|---|
| 484 | val = self._encrypt_data() |
|---|
| 485 | if len(val) > 4064: |
|---|
| 486 | raise BeakerException("Cookie value is too long to store") |
|---|
| 487 | |
|---|
| 488 | self.cookie[self.key] = val |
|---|
| 489 | if '_domain' in self: |
|---|
| 490 | self.cookie[self.key]['domain'] = self['_domain'] |
|---|
| 491 | elif self._domain: |
|---|
| 492 | self.cookie[self.key]['domain'] = self._domain |
|---|
| 493 | if self.secure: |
|---|
| 494 | self.cookie[self.key]['secure'] = True |
|---|
| 495 | |
|---|
| 496 | self.cookie[self.key]['path'] = self.get('_path', '/') |
|---|
| 497 | |
|---|
| 498 | if expires: |
|---|
| 499 | self.cookie[self.key]['expires'] = \ |
|---|
| 500 | expires.strftime("%a, %d-%b-%Y %H:%M:%S GMT" ) |
|---|
| 501 | self.request['cookie_out'] = self.cookie[self.key].output(header='') |
|---|
| 502 | self.request['set_cookie'] = True |
|---|
| 503 | |
|---|
| 504 | def delete(self): |
|---|
| 505 | """Delete the cookie, and clear the session""" |
|---|
| 506 | # Send a delete cookie request |
|---|
| 507 | self._delete_cookie() |
|---|
| 508 | self.clear() |
|---|
| 509 | |
|---|
| 510 | def invalidate(self): |
|---|
| 511 | """Clear the contents and start a new session""" |
|---|
| 512 | self.delete() |
|---|
| 513 | self['_id'] = self._make_id() |
|---|
| 514 | |
|---|
| 515 | |
|---|
| 516 | class SessionObject(object): |
|---|
| 517 | """Session proxy/lazy creator |
|---|
| 518 | |
|---|
| 519 | This object proxies access to the actual session object, so that in |
|---|
| 520 | the case that the session hasn't been used before, it will be |
|---|
| 521 | setup. This avoid creating and loading the session from persistent |
|---|
| 522 | storage unless its actually used during the request. |
|---|
| 523 | |
|---|
| 524 | """ |
|---|
| 525 | def __init__(self, environ, **params): |
|---|
| 526 | self.__dict__['_params'] = params |
|---|
| 527 | self.__dict__['_environ'] = environ |
|---|
| 528 | self.__dict__['_sess'] = None |
|---|
| 529 | self.__dict__['_headers'] = [] |
|---|
| 530 | |
|---|
| 531 | def _session(self): |
|---|
| 532 | """Lazy initial creation of session object""" |
|---|
| 533 | if self.__dict__['_sess'] is None: |
|---|
| 534 | params = self.__dict__['_params'] |
|---|
| 535 | environ = self.__dict__['_environ'] |
|---|
| 536 | self.__dict__['_headers'] = req = {'cookie_out':None} |
|---|
| 537 | req['cookie'] = environ.get('HTTP_COOKIE') |
|---|
| 538 | if params.get('type') == 'cookie': |
|---|
| 539 | self.__dict__['_sess'] = CookieSession(req, **params) |
|---|
| 540 | else: |
|---|
| 541 | self.__dict__['_sess'] = Session(req, use_cookies=True, |
|---|
| 542 | **params) |
|---|
| 543 | return self.__dict__['_sess'] |
|---|
| 544 | |
|---|
| 545 | def __getattr__(self, attr): |
|---|
| 546 | return getattr(self._session(), attr) |
|---|
| 547 | |
|---|
| 548 | def __setattr__(self, attr, value): |
|---|
| 549 | setattr(self._session(), attr, value) |
|---|
| 550 | |
|---|
| 551 | def __delattr__(self, name): |
|---|
| 552 | self._session().__delattr__(name) |
|---|
| 553 | |
|---|
| 554 | def __getitem__(self, key): |
|---|
| 555 | return self._session()[key] |
|---|
| 556 | |
|---|
| 557 | def __setitem__(self, key, value): |
|---|
| 558 | self._session()[key] = value |
|---|
| 559 | |
|---|
| 560 | def __delitem__(self, key): |
|---|
| 561 | self._session().__delitem__(key) |
|---|
| 562 | |
|---|
| 563 | def __repr__(self): |
|---|
| 564 | return self._session().__repr__() |
|---|
| 565 | |
|---|
| 566 | def __iter__(self): |
|---|
| 567 | """Only works for proxying to a dict""" |
|---|
| 568 | return iter(self._session().keys()) |
|---|
| 569 | |
|---|
| 570 | def __contains__(self, key): |
|---|
| 571 | return self._session().has_key(key) |
|---|
| 572 | |
|---|
| 573 | def get_by_id(self, id): |
|---|
| 574 | params = self.__dict__['_params'] |
|---|
| 575 | session = Session({}, use_cookies=False, id=id, **params) |
|---|
| 576 | if session.is_new: |
|---|
| 577 | return None |
|---|
| 578 | return session |
|---|
| 579 | |
|---|
| 580 | def save(self): |
|---|
| 581 | self.__dict__['_dirty'] = True |
|---|
| 582 | |
|---|
| 583 | def delete(self): |
|---|
| 584 | self.__dict__['_dirty'] = True |
|---|
| 585 | self._session().delete() |
|---|
| 586 | |
|---|
| 587 | def persist(self): |
|---|
| 588 | """Persist the session to the storage |
|---|
| 589 | |
|---|
| 590 | If its set to autosave, then the entire session will be saved |
|---|
| 591 | regardless of if save() has been called. Otherwise, just the |
|---|
| 592 | accessed time will be updated if save() was not called, or |
|---|
| 593 | the session will be saved if save() was called. |
|---|
| 594 | |
|---|
| 595 | """ |
|---|
| 596 | if self.__dict__['_params'].get('auto'): |
|---|
| 597 | self._session().save() |
|---|
| 598 | else: |
|---|
| 599 | if self.__dict__.get('_dirty'): |
|---|
| 600 | self._session().save() |
|---|
| 601 | else: |
|---|
| 602 | self._session().save(accessed_only=True) |
|---|
| 603 | |
|---|
| 604 | def dirty(self): |
|---|
| 605 | return self.__dict__.get('_dirty', False) |
|---|
| 606 | |
|---|
| 607 | def accessed(self): |
|---|
| 608 | return self.__dict__['_sess'] is not None |
|---|