mirror of
https://gitee.com/johng/gf.git
synced 2024-11-30 03:07:45 +08:00
213 lines
5.6 KiB
Go
213 lines
5.6 KiB
Go
// Copyright 2019 gf Author(https://github.com/gogf/gf). All Rights Reserved.
|
|
//
|
|
// This Source Code Form is subject to the terms of the MIT License.
|
|
// If a copy of the MIT was not distributed with this file,
|
|
// You can obtain one at https://github.com/gogf/gf.
|
|
|
|
package gsession
|
|
|
|
import (
|
|
"encoding/json"
|
|
"errors"
|
|
"os"
|
|
"time"
|
|
|
|
"github.com/gogf/gf/crypto/gaes"
|
|
|
|
"github.com/gogf/gf/os/gtimer"
|
|
|
|
"github.com/gogf/gf/container/gset"
|
|
"github.com/gogf/gf/encoding/gbinary"
|
|
|
|
"github.com/gogf/gf/os/gtime"
|
|
|
|
"github.com/gogf/gf/os/glog"
|
|
|
|
"github.com/gogf/gf/os/gfile"
|
|
)
|
|
|
|
// StorageFile implements the Session Storage interface with file system.
|
|
type StorageFile struct {
|
|
path string
|
|
cryptoKey []byte
|
|
cryptoEnabled bool
|
|
updatingIdSet *gset.StrSet
|
|
}
|
|
|
|
var (
|
|
DefaultStorageFilePath = gfile.Join(gfile.TempDir(), "gsessions")
|
|
DefaultStorageFileCryptoKey = []byte("Session storage file crypto key!")
|
|
DefaultStorageFileCryptoEnabled = false
|
|
DefaultStorageFileLoopInterval = time.Minute
|
|
ErrorDisabled = errors.New("this feature is disabled in this storage")
|
|
)
|
|
|
|
func init() {
|
|
tmpPath := "/tmp"
|
|
if gfile.Exists(tmpPath) && gfile.IsWritable(tmpPath) {
|
|
DefaultStorageFilePath = gfile.Join(tmpPath, "gsessions")
|
|
}
|
|
}
|
|
|
|
// NewStorageFile creates and returns a file storage object for session.
|
|
func NewStorageFile(path ...string) *StorageFile {
|
|
storagePath := DefaultStorageFilePath
|
|
if len(path) > 0 && path[0] != "" {
|
|
storagePath, _ = gfile.Search(path[0])
|
|
if storagePath == "" {
|
|
glog.Panicf("'%s' does not exist", path[0])
|
|
}
|
|
if !gfile.IsWritable(storagePath) {
|
|
glog.Panicf("'%s' is not writable", path[0])
|
|
}
|
|
}
|
|
if storagePath != "" {
|
|
if err := gfile.Mkdir(storagePath); err != nil {
|
|
glog.Panicf("mkdir '%s' failed: %v", path[0], err)
|
|
}
|
|
}
|
|
s := &StorageFile{
|
|
path: storagePath,
|
|
cryptoKey: DefaultStorageFileCryptoKey,
|
|
cryptoEnabled: DefaultStorageFileCryptoEnabled,
|
|
updatingIdSet: gset.NewStrSet(true),
|
|
}
|
|
// Batch updates the TTL for session ids timely.
|
|
gtimer.AddSingleton(DefaultStorageFileLoopInterval, func() {
|
|
id := ""
|
|
for {
|
|
if id = s.updatingIdSet.Pop(); id == "" {
|
|
break
|
|
}
|
|
s.doUpdateTTL(id)
|
|
}
|
|
})
|
|
return s
|
|
}
|
|
|
|
// SetCryptoKey sets the crypto key for session storage.
|
|
// The crypto key is used when crypto feature is enabled.
|
|
func (s *StorageFile) SetCryptoKey(key []byte) {
|
|
s.cryptoKey = key
|
|
}
|
|
|
|
// SetCryptoEnabled enables/disables the crypto feature for session storage.
|
|
func (s *StorageFile) SetCryptoEnabled(enabled bool) {
|
|
s.cryptoEnabled = enabled
|
|
}
|
|
|
|
// sessionFilePath returns the storage file path for given session id.
|
|
func (s *StorageFile) sessionFilePath(id string) string {
|
|
return gfile.Join(s.path, id)
|
|
}
|
|
|
|
// Get retrieves session value with given key.
|
|
// It returns nil if the key does not exist in the session.
|
|
func (s *StorageFile) Get(id string, key string) interface{} {
|
|
return nil
|
|
}
|
|
|
|
// GetMap retrieves all key-value pairs as map from storage.
|
|
func (s *StorageFile) GetMap(id string) map[string]interface{} {
|
|
return nil
|
|
}
|
|
|
|
// GetSize retrieves the size of key-value pairs from storage.
|
|
func (s *StorageFile) GetSize(id string) int {
|
|
return -1
|
|
}
|
|
|
|
// Set sets key-value session pair to the storage.
|
|
func (s *StorageFile) Set(id string, key string, value interface{}) error {
|
|
return ErrorDisabled
|
|
}
|
|
|
|
// SetMap batch sets key-value session pairs with map to the storage.
|
|
func (s *StorageFile) SetMap(id string, data map[string]interface{}) error {
|
|
return ErrorDisabled
|
|
}
|
|
|
|
// Remove deletes key with its value from storage.
|
|
func (s *StorageFile) Remove(id string, key string) error {
|
|
return ErrorDisabled
|
|
}
|
|
|
|
// RemoveAll deletes all key-value pairs from storage.
|
|
func (s *StorageFile) RemoveAll(id string) error {
|
|
return ErrorDisabled
|
|
}
|
|
|
|
// GetSession return the session data for given session id.
|
|
func (s *StorageFile) GetSession(id string, ttl time.Duration) map[string]interface{} {
|
|
path := s.sessionFilePath(id)
|
|
data := gfile.GetBytes(path)
|
|
if len(data) > 8 {
|
|
timestampMilli := gbinary.DecodeToInt64(data[:8])
|
|
if timestampMilli+ttl.Nanoseconds()/1e6 < gtime.Millisecond() {
|
|
return nil
|
|
}
|
|
var err error
|
|
content := data[8:]
|
|
// Decrypt with AES.
|
|
if s.cryptoEnabled {
|
|
content, err = gaes.Decrypt(data[8:], DefaultStorageFileCryptoKey)
|
|
if err != nil {
|
|
return nil
|
|
}
|
|
}
|
|
var m map[string]interface{}
|
|
if err = json.Unmarshal(content, &m); err != nil {
|
|
return nil
|
|
}
|
|
return m
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// SetSession updates the content for session id.
|
|
func (s *StorageFile) SetSession(id string, data map[string]interface{}) error {
|
|
path := s.sessionFilePath(id)
|
|
content, err := json.Marshal(data)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
// Encrypt with AES.
|
|
if s.cryptoEnabled {
|
|
content, err = gaes.Encrypt(content, DefaultStorageFileCryptoKey)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
file, err := gfile.OpenWithFlag(path, os.O_WRONLY|os.O_CREATE|os.O_TRUNC)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if _, err = file.Write(gbinary.EncodeInt64(gtime.Millisecond())); err != nil {
|
|
return err
|
|
}
|
|
if _, err = file.Write(content); err != nil {
|
|
return err
|
|
}
|
|
return file.Close()
|
|
}
|
|
|
|
// UpdateTTL updates the TTL for specified session id.
|
|
// It just adds the session id to the async handling queue.
|
|
func (s *StorageFile) UpdateTTL(id string) error {
|
|
s.updatingIdSet.Add(id)
|
|
return nil
|
|
}
|
|
|
|
// doUpdateTTL updates the TTL for session id.
|
|
func (s *StorageFile) doUpdateTTL(id string) error {
|
|
path := s.sessionFilePath(id)
|
|
file, err := gfile.OpenWithFlag(path, os.O_WRONLY)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if _, err = file.WriteAt(gbinary.EncodeInt64(gtime.Millisecond()), 0); err != nil {
|
|
return err
|
|
}
|
|
return file.Close()
|
|
}
|