242 lines
		
	
	
		
			6.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			242 lines
		
	
	
		
			6.3 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package session
 | 
						|
 | 
						|
import (
 | 
						|
	"crypto/hmac"
 | 
						|
	"crypto/md5"
 | 
						|
	"crypto/rand"
 | 
						|
	"crypto/sha1"
 | 
						|
	"encoding/hex"
 | 
						|
	"fmt"
 | 
						|
	"io"
 | 
						|
	"net/http"
 | 
						|
	"net/url"
 | 
						|
	"time"
 | 
						|
)
 | 
						|
 | 
						|
type SessionStore interface {
 | 
						|
	Set(key, value interface{}) error //set session value
 | 
						|
	Get(key interface{}) interface{}  //get session value
 | 
						|
	Delete(key interface{}) error     //delete session value
 | 
						|
	SessionID() string                //back current sessionID
 | 
						|
	SessionRelease()                  // release the resource & save data to provider
 | 
						|
	Flush() error                     //delete all data
 | 
						|
}
 | 
						|
 | 
						|
type Provider interface {
 | 
						|
	SessionInit(maxlifetime int64, savePath string) error
 | 
						|
	SessionRead(sid string) (SessionStore, error)
 | 
						|
	SessionExist(sid string) bool
 | 
						|
	SessionRegenerate(oldsid, sid string) (SessionStore, error)
 | 
						|
	SessionDestroy(sid string) error
 | 
						|
	SessionAll() int //get all active session
 | 
						|
	SessionGC()
 | 
						|
}
 | 
						|
 | 
						|
var provides = make(map[string]Provider)
 | 
						|
 | 
						|
// Register makes a session provide available by the provided name.
 | 
						|
// If Register is called twice with the same name or if driver is nil,
 | 
						|
// it panics.
 | 
						|
func Register(name string, provide Provider) {
 | 
						|
	if provide == nil {
 | 
						|
		panic("session: Register provide is nil")
 | 
						|
	}
 | 
						|
	if _, dup := provides[name]; dup {
 | 
						|
		panic("session: Register called twice for provider " + name)
 | 
						|
	}
 | 
						|
	provides[name] = provide
 | 
						|
}
 | 
						|
 | 
						|
type Manager struct {
 | 
						|
	cookieName  string //private cookiename
 | 
						|
	provider    Provider
 | 
						|
	maxlifetime int64
 | 
						|
	hashfunc    string //support md5 & sha1
 | 
						|
	hashkey     string
 | 
						|
	maxage      int //cookielifetime
 | 
						|
	secure      bool
 | 
						|
	options     []interface{}
 | 
						|
}
 | 
						|
 | 
						|
//options
 | 
						|
//1. is https  default false
 | 
						|
//2. hashfunc  default sha1
 | 
						|
//3. hashkey default beegosessionkey
 | 
						|
//4. maxage default is none
 | 
						|
func NewManager(provideName, cookieName string, maxlifetime int64, savePath string, options ...interface{}) (*Manager, error) {
 | 
						|
	provider, ok := provides[provideName]
 | 
						|
	if !ok {
 | 
						|
		return nil, fmt.Errorf("session: unknown provide %q (forgotten import?)", provideName)
 | 
						|
	}
 | 
						|
	provider.SessionInit(maxlifetime, savePath)
 | 
						|
	secure := false
 | 
						|
	if len(options) > 0 {
 | 
						|
		secure = options[0].(bool)
 | 
						|
	}
 | 
						|
	hashfunc := "sha1"
 | 
						|
	if len(options) > 1 {
 | 
						|
		hashfunc = options[1].(string)
 | 
						|
	}
 | 
						|
	hashkey := "beegosessionkey"
 | 
						|
	if len(options) > 2 {
 | 
						|
		hashkey = options[2].(string)
 | 
						|
	}
 | 
						|
	maxage := -1
 | 
						|
	if len(options) > 3 {
 | 
						|
		switch options[3].(type) {
 | 
						|
		case int:
 | 
						|
			if options[3].(int) > 0 {
 | 
						|
				maxage = options[3].(int)
 | 
						|
			} else if options[3].(int) < 0 {
 | 
						|
				maxage = 0
 | 
						|
			}
 | 
						|
		case int64:
 | 
						|
			if options[3].(int64) > 0 {
 | 
						|
				maxage = int(options[3].(int64))
 | 
						|
			} else if options[3].(int64) < 0 {
 | 
						|
				maxage = 0
 | 
						|
			}
 | 
						|
		case int32:
 | 
						|
			if options[3].(int32) > 0 {
 | 
						|
				maxage = int(options[3].(int32))
 | 
						|
			} else if options[3].(int32) < 0 {
 | 
						|
				maxage = 0
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return &Manager{
 | 
						|
		provider:    provider,
 | 
						|
		cookieName:  cookieName,
 | 
						|
		maxlifetime: maxlifetime,
 | 
						|
		hashfunc:    hashfunc,
 | 
						|
		hashkey:     hashkey,
 | 
						|
		maxage:      maxage,
 | 
						|
		secure:      secure,
 | 
						|
		options:     options,
 | 
						|
	}, nil
 | 
						|
}
 | 
						|
 | 
						|
//get Session
 | 
						|
func (manager *Manager) SessionStart(w http.ResponseWriter, r *http.Request) (session SessionStore) {
 | 
						|
	cookie, err := r.Cookie(manager.cookieName)
 | 
						|
	if err != nil || cookie.Value == "" {
 | 
						|
		sid := manager.sessionId(r)
 | 
						|
		session, _ = manager.provider.SessionRead(sid)
 | 
						|
		cookie = &http.Cookie{Name: manager.cookieName,
 | 
						|
			Value:    url.QueryEscape(sid),
 | 
						|
			Path:     "/",
 | 
						|
			HttpOnly: true,
 | 
						|
			Secure:   manager.secure}
 | 
						|
		if manager.maxage >= 0 {
 | 
						|
			cookie.MaxAge = manager.maxage
 | 
						|
		}
 | 
						|
		http.SetCookie(w, cookie)
 | 
						|
		r.AddCookie(cookie)
 | 
						|
	} else {
 | 
						|
		sid, _ := url.QueryUnescape(cookie.Value)
 | 
						|
		if manager.provider.SessionExist(sid) {
 | 
						|
			session, _ = manager.provider.SessionRead(sid)
 | 
						|
		} else {
 | 
						|
			sid = manager.sessionId(r)
 | 
						|
			session, _ = manager.provider.SessionRead(sid)
 | 
						|
			cookie = &http.Cookie{Name: manager.cookieName,
 | 
						|
				Value:    url.QueryEscape(sid),
 | 
						|
				Path:     "/",
 | 
						|
				HttpOnly: true,
 | 
						|
				Secure:   manager.secure}
 | 
						|
			if manager.maxage >= 0 {
 | 
						|
				cookie.MaxAge = manager.maxage
 | 
						|
			}
 | 
						|
			http.SetCookie(w, cookie)
 | 
						|
			r.AddCookie(cookie)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return
 | 
						|
}
 | 
						|
 | 
						|
//Destroy sessionid
 | 
						|
func (manager *Manager) SessionDestroy(w http.ResponseWriter, r *http.Request) {
 | 
						|
	cookie, err := r.Cookie(manager.cookieName)
 | 
						|
	if err != nil || cookie.Value == "" {
 | 
						|
		return
 | 
						|
	} else {
 | 
						|
		manager.provider.SessionDestroy(cookie.Value)
 | 
						|
		expiration := time.Now()
 | 
						|
		cookie := http.Cookie{Name: manager.cookieName, Path: "/", HttpOnly: true, Expires: expiration, MaxAge: -1}
 | 
						|
		http.SetCookie(w, &cookie)
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
func (manager *Manager) GetProvider(sid string) (sessions SessionStore, err error) {
 | 
						|
	sessions, err = manager.provider.SessionRead(sid)
 | 
						|
	return
 | 
						|
}
 | 
						|
 | 
						|
func (manager *Manager) GC() {
 | 
						|
	manager.provider.SessionGC()
 | 
						|
	time.AfterFunc(time.Duration(manager.maxlifetime)*time.Second, func() { manager.GC() })
 | 
						|
}
 | 
						|
 | 
						|
func (manager *Manager) SessionRegenerateId(w http.ResponseWriter, r *http.Request) (session SessionStore) {
 | 
						|
	sid := manager.sessionId(r)
 | 
						|
	cookie, err := r.Cookie(manager.cookieName)
 | 
						|
	if err != nil && cookie.Value == "" {
 | 
						|
		//delete old cookie
 | 
						|
		session, _ = manager.provider.SessionRead(sid)
 | 
						|
		cookie = &http.Cookie{Name: manager.cookieName,
 | 
						|
			Value:    url.QueryEscape(sid),
 | 
						|
			Path:     "/",
 | 
						|
			HttpOnly: true,
 | 
						|
			Secure:   manager.secure,
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		oldsid, _ := url.QueryUnescape(cookie.Value)
 | 
						|
		session, _ = manager.provider.SessionRegenerate(oldsid, sid)
 | 
						|
		cookie.Value = url.QueryEscape(sid)
 | 
						|
		cookie.HttpOnly = true
 | 
						|
		cookie.Path = "/"
 | 
						|
	}
 | 
						|
	if manager.maxage >= 0 {
 | 
						|
		cookie.MaxAge = manager.maxage
 | 
						|
	}
 | 
						|
	http.SetCookie(w, cookie)
 | 
						|
	r.AddCookie(cookie)
 | 
						|
	return
 | 
						|
}
 | 
						|
 | 
						|
func (manager *Manager) GetActiveSession() int {
 | 
						|
	return manager.provider.SessionAll()
 | 
						|
}
 | 
						|
 | 
						|
func (manager *Manager) SetHashFunc(hasfunc, hashkey string) {
 | 
						|
	manager.hashfunc = hasfunc
 | 
						|
	manager.hashkey = hashkey
 | 
						|
}
 | 
						|
 | 
						|
func (manager *Manager) SetSecure(secure bool) {
 | 
						|
	manager.secure = secure
 | 
						|
}
 | 
						|
 | 
						|
//remote_addr cruunixnano randdata
 | 
						|
func (manager *Manager) sessionId(r *http.Request) (sid string) {
 | 
						|
	bs := make([]byte, 24)
 | 
						|
	if _, err := io.ReadFull(rand.Reader, bs); err != nil {
 | 
						|
		return ""
 | 
						|
	}
 | 
						|
	sig := fmt.Sprintf("%s%d%s", r.RemoteAddr, time.Now().UnixNano(), bs)
 | 
						|
	if manager.hashfunc == "md5" {
 | 
						|
		h := md5.New()
 | 
						|
		h.Write([]byte(sig))
 | 
						|
		sid = hex.EncodeToString(h.Sum(nil))
 | 
						|
	} else if manager.hashfunc == "sha1" {
 | 
						|
		h := hmac.New(sha1.New, []byte(manager.hashkey))
 | 
						|
		fmt.Fprintf(h, "%s", sig)
 | 
						|
		sid = hex.EncodeToString(h.Sum(nil))
 | 
						|
	} else {
 | 
						|
		h := hmac.New(sha1.New, []byte(manager.hashkey))
 | 
						|
		fmt.Fprintf(h, "%s", sig)
 | 
						|
		sid = hex.EncodeToString(h.Sum(nil))
 | 
						|
	}
 | 
						|
	return
 | 
						|
}
 |