summaryrefslogtreecommitdiff
path: root/lib/python2.7/site-packages/django/contrib/sessions/backends
diff options
context:
space:
mode:
Diffstat (limited to 'lib/python2.7/site-packages/django/contrib/sessions/backends')
-rw-r--r--lib/python2.7/site-packages/django/contrib/sessions/backends/__init__.py0
-rw-r--r--lib/python2.7/site-packages/django/contrib/sessions/backends/base.py327
-rw-r--r--lib/python2.7/site-packages/django/contrib/sessions/backends/cache.py74
-rw-r--r--lib/python2.7/site-packages/django/contrib/sessions/backends/cached_db.py84
-rw-r--r--lib/python2.7/site-packages/django/contrib/sessions/backends/db.py85
-rw-r--r--lib/python2.7/site-packages/django/contrib/sessions/backends/file.py202
-rw-r--r--lib/python2.7/site-packages/django/contrib/sessions/backends/signed_cookies.py81
7 files changed, 0 insertions, 853 deletions
diff --git a/lib/python2.7/site-packages/django/contrib/sessions/backends/__init__.py b/lib/python2.7/site-packages/django/contrib/sessions/backends/__init__.py
deleted file mode 100644
index e69de29..0000000
--- a/lib/python2.7/site-packages/django/contrib/sessions/backends/__init__.py
+++ /dev/null
diff --git a/lib/python2.7/site-packages/django/contrib/sessions/backends/base.py b/lib/python2.7/site-packages/django/contrib/sessions/backends/base.py
deleted file mode 100644
index 7f5e958..0000000
--- a/lib/python2.7/site-packages/django/contrib/sessions/backends/base.py
+++ /dev/null
@@ -1,327 +0,0 @@
-from __future__ import unicode_literals
-
-import base64
-from datetime import datetime, timedelta
-import logging
-import string
-
-from django.conf import settings
-from django.core.exceptions import SuspiciousOperation
-from django.utils.crypto import constant_time_compare
-from django.utils.crypto import get_random_string
-from django.utils.crypto import salted_hmac
-from django.utils import timezone
-from django.utils.encoding import force_bytes, force_text
-from django.utils.module_loading import import_by_path
-
-from django.contrib.sessions.exceptions import SuspiciousSession
-
-# session_key should not be case sensitive because some backends can store it
-# on case insensitive file systems.
-VALID_KEY_CHARS = string.ascii_lowercase + string.digits
-
-class CreateError(Exception):
- """
- Used internally as a consistent exception type to catch from save (see the
- docstring for SessionBase.save() for details).
- """
- pass
-
-class SessionBase(object):
- """
- Base class for all Session classes.
- """
- TEST_COOKIE_NAME = 'testcookie'
- TEST_COOKIE_VALUE = 'worked'
-
- def __init__(self, session_key=None):
- self._session_key = session_key
- self.accessed = False
- self.modified = False
- self.serializer = import_by_path(settings.SESSION_SERIALIZER)
-
- def __contains__(self, key):
- return key in self._session
-
- def __getitem__(self, key):
- return self._session[key]
-
- def __setitem__(self, key, value):
- self._session[key] = value
- self.modified = True
-
- def __delitem__(self, key):
- del self._session[key]
- self.modified = True
-
- def get(self, key, default=None):
- return self._session.get(key, default)
-
- def pop(self, key, *args):
- self.modified = self.modified or key in self._session
- return self._session.pop(key, *args)
-
- def setdefault(self, key, value):
- if key in self._session:
- return self._session[key]
- else:
- self.modified = True
- self._session[key] = value
- return value
-
- def set_test_cookie(self):
- self[self.TEST_COOKIE_NAME] = self.TEST_COOKIE_VALUE
-
- def test_cookie_worked(self):
- return self.get(self.TEST_COOKIE_NAME) == self.TEST_COOKIE_VALUE
-
- def delete_test_cookie(self):
- del self[self.TEST_COOKIE_NAME]
-
- def _hash(self, value):
- key_salt = "django.contrib.sessions" + self.__class__.__name__
- return salted_hmac(key_salt, value).hexdigest()
-
- def encode(self, session_dict):
- "Returns the given session dictionary serialized and encoded as a string."
- serialized = self.serializer().dumps(session_dict)
- hash = self._hash(serialized)
- return base64.b64encode(hash.encode() + b":" + serialized).decode('ascii')
-
- def decode(self, session_data):
- encoded_data = base64.b64decode(force_bytes(session_data))
- try:
- # could produce ValueError if there is no ':'
- hash, serialized = encoded_data.split(b':', 1)
- expected_hash = self._hash(serialized)
- if not constant_time_compare(hash.decode(), expected_hash):
- raise SuspiciousSession("Session data corrupted")
- else:
- return self.serializer().loads(serialized)
- except Exception as e:
- # ValueError, SuspiciousOperation, unpickling exceptions. If any of
- # these happen, just return an empty dictionary (an empty session).
- if isinstance(e, SuspiciousOperation):
- logger = logging.getLogger('django.security.%s' %
- e.__class__.__name__)
- logger.warning(force_text(e))
- return {}
-
- def update(self, dict_):
- self._session.update(dict_)
- self.modified = True
-
- def has_key(self, key):
- return key in self._session
-
- def keys(self):
- return self._session.keys()
-
- def values(self):
- return self._session.values()
-
- def items(self):
- return self._session.items()
-
- def iterkeys(self):
- return self._session.iterkeys()
-
- def itervalues(self):
- return self._session.itervalues()
-
- def iteritems(self):
- return self._session.iteritems()
-
- def clear(self):
- # To avoid unnecessary persistent storage accesses, we set up the
- # internals directly (loading data wastes time, since we are going to
- # set it to an empty dict anyway).
- self._session_cache = {}
- self.accessed = True
- self.modified = True
-
- def _get_new_session_key(self):
- "Returns session key that isn't being used."
- while True:
- session_key = get_random_string(32, VALID_KEY_CHARS)
- if not self.exists(session_key):
- break
- return session_key
-
- def _get_or_create_session_key(self):
- if self._session_key is None:
- self._session_key = self._get_new_session_key()
- return self._session_key
-
- def _get_session_key(self):
- return self._session_key
-
- session_key = property(_get_session_key)
-
- def _get_session(self, no_load=False):
- """
- Lazily loads session from storage (unless "no_load" is True, when only
- an empty dict is stored) and stores it in the current instance.
- """
- self.accessed = True
- try:
- return self._session_cache
- except AttributeError:
- if self.session_key is None or no_load:
- self._session_cache = {}
- else:
- self._session_cache = self.load()
- return self._session_cache
-
- _session = property(_get_session)
-
- def get_expiry_age(self, **kwargs):
- """Get the number of seconds until the session expires.
-
- Optionally, this function accepts `modification` and `expiry` keyword
- arguments specifying the modification and expiry of the session.
- """
- try:
- modification = kwargs['modification']
- except KeyError:
- modification = timezone.now()
- # Make the difference between "expiry=None passed in kwargs" and
- # "expiry not passed in kwargs", in order to guarantee not to trigger
- # self.load() when expiry is provided.
- try:
- expiry = kwargs['expiry']
- except KeyError:
- expiry = self.get('_session_expiry')
-
- if not expiry: # Checks both None and 0 cases
- return settings.SESSION_COOKIE_AGE
- if not isinstance(expiry, datetime):
- return expiry
- delta = expiry - modification
- return delta.days * 86400 + delta.seconds
-
- def get_expiry_date(self, **kwargs):
- """Get session the expiry date (as a datetime object).
-
- Optionally, this function accepts `modification` and `expiry` keyword
- arguments specifying the modification and expiry of the session.
- """
- try:
- modification = kwargs['modification']
- except KeyError:
- modification = timezone.now()
- # Same comment as in get_expiry_age
- try:
- expiry = kwargs['expiry']
- except KeyError:
- expiry = self.get('_session_expiry')
-
- if isinstance(expiry, datetime):
- return expiry
- if not expiry: # Checks both None and 0 cases
- expiry = settings.SESSION_COOKIE_AGE
- return modification + timedelta(seconds=expiry)
-
- def set_expiry(self, value):
- """
- Sets a custom expiration for the session. ``value`` can be an integer,
- a Python ``datetime`` or ``timedelta`` object or ``None``.
-
- If ``value`` is an integer, the session will expire after that many
- seconds of inactivity. If set to ``0`` then the session will expire on
- browser close.
-
- If ``value`` is a ``datetime`` or ``timedelta`` object, the session
- will expire at that specific future time.
-
- If ``value`` is ``None``, the session uses the global session expiry
- policy.
- """
- if value is None:
- # Remove any custom expiration for this session.
- try:
- del self['_session_expiry']
- except KeyError:
- pass
- return
- if isinstance(value, timedelta):
- value = timezone.now() + value
- self['_session_expiry'] = value
-
- def get_expire_at_browser_close(self):
- """
- Returns ``True`` if the session is set to expire when the browser
- closes, and ``False`` if there's an expiry date. Use
- ``get_expiry_date()`` or ``get_expiry_age()`` to find the actual expiry
- date/age, if there is one.
- """
- if self.get('_session_expiry') is None:
- return settings.SESSION_EXPIRE_AT_BROWSER_CLOSE
- return self.get('_session_expiry') == 0
-
- def flush(self):
- """
- Removes the current session data from the database and regenerates the
- key.
- """
- self.clear()
- self.delete()
- self.create()
-
- def cycle_key(self):
- """
- Creates a new session key, whilst retaining the current session data.
- """
- data = self._session_cache
- key = self.session_key
- self.create()
- self._session_cache = data
- self.delete(key)
-
- # Methods that child classes must implement.
-
- def exists(self, session_key):
- """
- Returns True if the given session_key already exists.
- """
- raise NotImplementedError
-
- def create(self):
- """
- Creates a new session instance. Guaranteed to create a new object with
- a unique key and will have saved the result once (with empty data)
- before the method returns.
- """
- raise NotImplementedError
-
- def save(self, must_create=False):
- """
- Saves the session data. If 'must_create' is True, a new session object
- is created (otherwise a CreateError exception is raised). Otherwise,
- save() can update an existing object with the same key.
- """
- raise NotImplementedError
-
- def delete(self, session_key=None):
- """
- Deletes the session data under this key. If the key is None, the
- current session key value is used.
- """
- raise NotImplementedError
-
- def load(self):
- """
- Loads the session data and returns a dictionary.
- """
- raise NotImplementedError
-
- @classmethod
- def clear_expired(cls):
- """
- Remove expired sessions from the session store.
-
- If this operation isn't possible on a given backend, it should raise
- NotImplementedError. If it isn't necessary, because the backend has
- a built-in expiration mechanism, it should be a no-op.
- """
- raise NotImplementedError
diff --git a/lib/python2.7/site-packages/django/contrib/sessions/backends/cache.py b/lib/python2.7/site-packages/django/contrib/sessions/backends/cache.py
deleted file mode 100644
index 596042f..0000000
--- a/lib/python2.7/site-packages/django/contrib/sessions/backends/cache.py
+++ /dev/null
@@ -1,74 +0,0 @@
-from django.conf import settings
-from django.contrib.sessions.backends.base import SessionBase, CreateError
-from django.core.cache import get_cache
-from django.utils.six.moves import xrange
-
-KEY_PREFIX = "django.contrib.sessions.cache"
-
-
-class SessionStore(SessionBase):
- """
- A cache-based session store.
- """
- def __init__(self, session_key=None):
- self._cache = get_cache(settings.SESSION_CACHE_ALIAS)
- super(SessionStore, self).__init__(session_key)
-
- @property
- def cache_key(self):
- return KEY_PREFIX + self._get_or_create_session_key()
-
- def load(self):
- try:
- session_data = self._cache.get(self.cache_key, None)
- except Exception:
- # Some backends (e.g. memcache) raise an exception on invalid
- # cache keys. If this happens, reset the session. See #17810.
- session_data = None
- if session_data is not None:
- return session_data
- self.create()
- return {}
-
- def create(self):
- # Because a cache can fail silently (e.g. memcache), we don't know if
- # we are failing to create a new session because of a key collision or
- # because the cache is missing. So we try for a (large) number of times
- # and then raise an exception. That's the risk you shoulder if using
- # cache backing.
- for i in xrange(10000):
- self._session_key = self._get_new_session_key()
- try:
- self.save(must_create=True)
- except CreateError:
- continue
- self.modified = True
- return
- raise RuntimeError(
- "Unable to create a new session key. "
- "It is likely that the cache is unavailable.")
-
- def save(self, must_create=False):
- if must_create:
- func = self._cache.add
- else:
- func = self._cache.set
- result = func(self.cache_key,
- self._get_session(no_load=must_create),
- self.get_expiry_age())
- if must_create and not result:
- raise CreateError
-
- def exists(self, session_key):
- return (KEY_PREFIX + session_key) in self._cache
-
- def delete(self, session_key=None):
- if session_key is None:
- if self.session_key is None:
- return
- session_key = self.session_key
- self._cache.delete(KEY_PREFIX + session_key)
-
- @classmethod
- def clear_expired(cls):
- pass
diff --git a/lib/python2.7/site-packages/django/contrib/sessions/backends/cached_db.py b/lib/python2.7/site-packages/django/contrib/sessions/backends/cached_db.py
deleted file mode 100644
index be22c1f..0000000
--- a/lib/python2.7/site-packages/django/contrib/sessions/backends/cached_db.py
+++ /dev/null
@@ -1,84 +0,0 @@
-"""
-Cached, database-backed sessions.
-"""
-
-import logging
-
-from django.contrib.sessions.backends.db import SessionStore as DBStore
-from django.core.cache import cache
-from django.core.exceptions import SuspiciousOperation
-from django.utils import timezone
-from django.utils.encoding import force_text
-
-KEY_PREFIX = "django.contrib.sessions.cached_db"
-
-
-class SessionStore(DBStore):
- """
- Implements cached, database backed sessions.
- """
-
- def __init__(self, session_key=None):
- super(SessionStore, self).__init__(session_key)
-
- @property
- def cache_key(self):
- return KEY_PREFIX + self._get_or_create_session_key()
-
- def load(self):
- try:
- data = cache.get(self.cache_key, None)
- except Exception:
- # Some backends (e.g. memcache) raise an exception on invalid
- # cache keys. If this happens, reset the session. See #17810.
- data = None
-
- if data is None:
- # Duplicate DBStore.load, because we need to keep track
- # of the expiry date to set it properly in the cache.
- try:
- s = Session.objects.get(
- session_key=self.session_key,
- expire_date__gt=timezone.now()
- )
- data = self.decode(s.session_data)
- cache.set(self.cache_key, data,
- self.get_expiry_age(expiry=s.expire_date))
- except (Session.DoesNotExist, SuspiciousOperation) as e:
- if isinstance(e, SuspiciousOperation):
- logger = logging.getLogger('django.security.%s' %
- e.__class__.__name__)
- logger.warning(force_text(e))
- self.create()
- data = {}
- return data
-
- def exists(self, session_key):
- if (KEY_PREFIX + session_key) in cache:
- return True
- return super(SessionStore, self).exists(session_key)
-
- def save(self, must_create=False):
- super(SessionStore, self).save(must_create)
- cache.set(self.cache_key, self._session, self.get_expiry_age())
-
- def delete(self, session_key=None):
- super(SessionStore, self).delete(session_key)
- if session_key is None:
- if self.session_key is None:
- return
- session_key = self.session_key
- cache.delete(KEY_PREFIX + session_key)
-
- def flush(self):
- """
- Removes the current session data from the database and regenerates the
- key.
- """
- self.clear()
- self.delete(self.session_key)
- self.create()
-
-
-# At bottom to avoid circular import
-from django.contrib.sessions.models import Session
diff --git a/lib/python2.7/site-packages/django/contrib/sessions/backends/db.py b/lib/python2.7/site-packages/django/contrib/sessions/backends/db.py
deleted file mode 100644
index 7be99c3..0000000
--- a/lib/python2.7/site-packages/django/contrib/sessions/backends/db.py
+++ /dev/null
@@ -1,85 +0,0 @@
-import logging
-
-from django.contrib.sessions.backends.base import SessionBase, CreateError
-from django.core.exceptions import SuspiciousOperation
-from django.db import IntegrityError, transaction, router
-from django.utils import timezone
-from django.utils.encoding import force_text
-
-class SessionStore(SessionBase):
- """
- Implements database session store.
- """
- def __init__(self, session_key=None):
- super(SessionStore, self).__init__(session_key)
-
- def load(self):
- try:
- s = Session.objects.get(
- session_key=self.session_key,
- expire_date__gt=timezone.now()
- )
- return self.decode(s.session_data)
- except (Session.DoesNotExist, SuspiciousOperation) as e:
- if isinstance(e, SuspiciousOperation):
- logger = logging.getLogger('django.security.%s' %
- e.__class__.__name__)
- logger.warning(force_text(e))
- self.create()
- return {}
-
- def exists(self, session_key):
- return Session.objects.filter(session_key=session_key).exists()
-
- def create(self):
- while True:
- self._session_key = self._get_new_session_key()
- try:
- # Save immediately to ensure we have a unique entry in the
- # database.
- self.save(must_create=True)
- except CreateError:
- # Key wasn't unique. Try again.
- continue
- self.modified = True
- self._session_cache = {}
- return
-
- def save(self, must_create=False):
- """
- Saves the current session data to the database. If 'must_create' is
- True, a database error will be raised if the saving operation doesn't
- create a *new* entry (as opposed to possibly updating an existing
- entry).
- """
- obj = Session(
- session_key=self._get_or_create_session_key(),
- session_data=self.encode(self._get_session(no_load=must_create)),
- expire_date=self.get_expiry_date()
- )
- using = router.db_for_write(Session, instance=obj)
- try:
- with transaction.atomic(using=using):
- obj.save(force_insert=must_create, using=using)
- except IntegrityError:
- if must_create:
- raise CreateError
- raise
-
- def delete(self, session_key=None):
- if session_key is None:
- if self.session_key is None:
- return
- session_key = self.session_key
- try:
- Session.objects.get(session_key=session_key).delete()
- except Session.DoesNotExist:
- pass
-
- @classmethod
- def clear_expired(cls):
- Session.objects.filter(expire_date__lt=timezone.now()).delete()
-
-
-# At bottom to avoid circular import
-from django.contrib.sessions.models import Session
diff --git a/lib/python2.7/site-packages/django/contrib/sessions/backends/file.py b/lib/python2.7/site-packages/django/contrib/sessions/backends/file.py
deleted file mode 100644
index f47aa2d..0000000
--- a/lib/python2.7/site-packages/django/contrib/sessions/backends/file.py
+++ /dev/null
@@ -1,202 +0,0 @@
-import datetime
-import errno
-import logging
-import os
-import shutil
-import tempfile
-
-from django.conf import settings
-from django.contrib.sessions.backends.base import SessionBase, CreateError, VALID_KEY_CHARS
-from django.core.exceptions import SuspiciousOperation, ImproperlyConfigured
-from django.utils import timezone
-from django.utils.encoding import force_text
-
-from django.contrib.sessions.exceptions import InvalidSessionKey
-
-class SessionStore(SessionBase):
- """
- Implements a file based session store.
- """
- def __init__(self, session_key=None):
- self.storage_path = type(self)._get_storage_path()
- self.file_prefix = settings.SESSION_COOKIE_NAME
- super(SessionStore, self).__init__(session_key)
-
- @classmethod
- def _get_storage_path(cls):
- try:
- return cls._storage_path
- except AttributeError:
- storage_path = getattr(settings, "SESSION_FILE_PATH", None)
- if not storage_path:
- storage_path = tempfile.gettempdir()
-
- # Make sure the storage path is valid.
- if not os.path.isdir(storage_path):
- raise ImproperlyConfigured(
- "The session storage path %r doesn't exist. Please set your"
- " SESSION_FILE_PATH setting to an existing directory in which"
- " Django can store session data." % storage_path)
-
- cls._storage_path = storage_path
- return storage_path
-
- def _key_to_file(self, session_key=None):
- """
- Get the file associated with this session key.
- """
- if session_key is None:
- session_key = self._get_or_create_session_key()
-
- # Make sure we're not vulnerable to directory traversal. Session keys
- # should always be md5s, so they should never contain directory
- # components.
- if not set(session_key).issubset(set(VALID_KEY_CHARS)):
- raise InvalidSessionKey(
- "Invalid characters in session key")
-
- return os.path.join(self.storage_path, self.file_prefix + session_key)
-
- def _last_modification(self):
- """
- Return the modification time of the file storing the session's content.
- """
- modification = os.stat(self._key_to_file()).st_mtime
- if settings.USE_TZ:
- modification = datetime.datetime.utcfromtimestamp(modification)
- modification = modification.replace(tzinfo=timezone.utc)
- else:
- modification = datetime.datetime.fromtimestamp(modification)
- return modification
-
- def load(self):
- session_data = {}
- try:
- with open(self._key_to_file(), "rb") as session_file:
- file_data = session_file.read()
- # Don't fail if there is no data in the session file.
- # We may have opened the empty placeholder file.
- if file_data:
- try:
- session_data = self.decode(file_data)
- except (EOFError, SuspiciousOperation) as e:
- if isinstance(e, SuspiciousOperation):
- logger = logging.getLogger('django.security.%s' %
- e.__class__.__name__)
- logger.warning(force_text(e))
- self.create()
-
- # Remove expired sessions.
- expiry_age = self.get_expiry_age(
- modification=self._last_modification(),
- expiry=session_data.get('_session_expiry'))
- if expiry_age < 0:
- session_data = {}
- self.delete()
- self.create()
- except (IOError, SuspiciousOperation):
- self.create()
- return session_data
-
- def create(self):
- while True:
- self._session_key = self._get_new_session_key()
- try:
- self.save(must_create=True)
- except CreateError:
- continue
- self.modified = True
- self._session_cache = {}
- return
-
- def save(self, must_create=False):
- # Get the session data now, before we start messing
- # with the file it is stored within.
- session_data = self._get_session(no_load=must_create)
-
- session_file_name = self._key_to_file()
-
- try:
- # Make sure the file exists. If it does not already exist, an
- # empty placeholder file is created.
- flags = os.O_WRONLY | os.O_CREAT | getattr(os, 'O_BINARY', 0)
- if must_create:
- flags |= os.O_EXCL
- fd = os.open(session_file_name, flags)
- os.close(fd)
-
- except OSError as e:
- if must_create and e.errno == errno.EEXIST:
- raise CreateError
- raise
-
- # Write the session file without interfering with other threads
- # or processes. By writing to an atomically generated temporary
- # file and then using the atomic os.rename() to make the complete
- # file visible, we avoid having to lock the session file, while
- # still maintaining its integrity.
- #
- # Note: Locking the session file was explored, but rejected in part
- # because in order to be atomic and cross-platform, it required a
- # long-lived lock file for each session, doubling the number of
- # files in the session storage directory at any given time. This
- # rename solution is cleaner and avoids any additional overhead
- # when reading the session data, which is the more common case
- # unless SESSION_SAVE_EVERY_REQUEST = True.
- #
- # See ticket #8616.
- dir, prefix = os.path.split(session_file_name)
-
- try:
- output_file_fd, output_file_name = tempfile.mkstemp(dir=dir,
- prefix=prefix + '_out_')
- renamed = False
- try:
- try:
- os.write(output_file_fd, self.encode(session_data).encode())
- finally:
- os.close(output_file_fd)
-
- # This will atomically rename the file (os.rename) if the OS
- # supports it. Otherwise this will result in a shutil.copy2
- # and os.unlink (for example on Windows). See #9084.
- shutil.move(output_file_name, session_file_name)
- renamed = True
- finally:
- if not renamed:
- os.unlink(output_file_name)
-
- except (OSError, IOError, EOFError):
- pass
-
- def exists(self, session_key):
- return os.path.exists(self._key_to_file(session_key))
-
- def delete(self, session_key=None):
- if session_key is None:
- if self.session_key is None:
- return
- session_key = self.session_key
- try:
- os.unlink(self._key_to_file(session_key))
- except OSError:
- pass
-
- def clean(self):
- pass
-
- @classmethod
- def clear_expired(cls):
- storage_path = cls._get_storage_path()
- file_prefix = settings.SESSION_COOKIE_NAME
-
- for session_file in os.listdir(storage_path):
- if not session_file.startswith(file_prefix):
- continue
- session_key = session_file[len(file_prefix):]
- session = cls(session_key)
- # When an expired session is loaded, its file is removed, and a
- # new file is immediately created. Prevent this by disabling
- # the create() method.
- session.create = lambda: None
- session.load()
diff --git a/lib/python2.7/site-packages/django/contrib/sessions/backends/signed_cookies.py b/lib/python2.7/site-packages/django/contrib/sessions/backends/signed_cookies.py
deleted file mode 100644
index 77a6750..0000000
--- a/lib/python2.7/site-packages/django/contrib/sessions/backends/signed_cookies.py
+++ /dev/null
@@ -1,81 +0,0 @@
-from django.conf import settings
-from django.core import signing
-
-from django.contrib.sessions.backends.base import SessionBase
-
-
-class SessionStore(SessionBase):
-
- def load(self):
- """
- We load the data from the key itself instead of fetching from
- some external data store. Opposite of _get_session_key(),
- raises BadSignature if signature fails.
- """
- try:
- return signing.loads(self.session_key,
- serializer=self.serializer,
- # This doesn't handle non-default expiry dates, see #19201
- max_age=settings.SESSION_COOKIE_AGE,
- salt='django.contrib.sessions.backends.signed_cookies')
- except (signing.BadSignature, ValueError):
- self.create()
- return {}
-
- def create(self):
- """
- To create a new key, we simply make sure that the modified flag is set
- so that the cookie is set on the client for the current request.
- """
- self.modified = True
-
- def save(self, must_create=False):
- """
- To save, we get the session key as a securely signed string and then
- set the modified flag so that the cookie is set on the client for the
- current request.
- """
- self._session_key = self._get_session_key()
- self.modified = True
-
- def exists(self, session_key=None):
- """
- This method makes sense when you're talking to a shared resource, but
- it doesn't matter when you're storing the information in the client's
- cookie.
- """
- return False
-
- def delete(self, session_key=None):
- """
- To delete, we clear the session key and the underlying data structure
- and set the modified flag so that the cookie is set on the client for
- the current request.
- """
- self._session_key = ''
- self._session_cache = {}
- self.modified = True
-
- def cycle_key(self):
- """
- Keeps the same data but with a new key. To do this, we just have to
- call ``save()`` and it will automatically save a cookie with a new key
- at the end of the request.
- """
- self.save()
-
- def _get_session_key(self):
- """
- Most session backends don't need to override this method, but we do,
- because instead of generating a random string, we want to actually
- generate a secure url-safe Base64-encoded string of data as our
- session key.
- """
- session_cache = getattr(self, '_session_cache', {})
- return signing.dumps(session_cache, compress=True,
- salt='django.contrib.sessions.backends.signed_cookies',
- serializer=self.serializer)
-
- @classmethod
- def clear_expired(cls):
- pass