forked from bton/matekasse
tests versuch 2
This commit is contained in:
parent
fdf385fe06
commit
c88f7df83a
2363 changed files with 408191 additions and 0 deletions
98
venv/lib/python3.11/site-packages/flask_session/__init__.py
Normal file
98
venv/lib/python3.11/site-packages/flask_session/__init__.py
Normal file
|
@ -0,0 +1,98 @@
|
|||
import os
|
||||
|
||||
from .sessions import NullSessionInterface, RedisSessionInterface, \
|
||||
MemcachedSessionInterface, FileSystemSessionInterface, \
|
||||
MongoDBSessionInterface, SqlAlchemySessionInterface
|
||||
|
||||
__version__ = '0.5.0'
|
||||
|
||||
|
||||
class Session(object):
|
||||
"""This class is used to add Server-side Session to one or more Flask
|
||||
applications.
|
||||
|
||||
There are two usage modes. One is initialize the instance with a very
|
||||
specific Flask application::
|
||||
|
||||
app = Flask(__name__)
|
||||
Session(app)
|
||||
|
||||
The second possibility is to create the object once and configure the
|
||||
application later::
|
||||
|
||||
sess = Session()
|
||||
|
||||
def create_app():
|
||||
app = Flask(__name__)
|
||||
sess.init_app(app)
|
||||
return app
|
||||
|
||||
By default Flask-Session will use :class:`NullSessionInterface`, you
|
||||
really should configurate your app to use a different SessionInterface.
|
||||
|
||||
.. note::
|
||||
|
||||
You can not use ``Session`` instance directly, what ``Session`` does
|
||||
is just change the :attr:`~flask.Flask.session_interface` attribute on
|
||||
your Flask applications.
|
||||
"""
|
||||
|
||||
def __init__(self, app=None):
|
||||
self.app = app
|
||||
if app is not None:
|
||||
self.init_app(app)
|
||||
|
||||
def init_app(self, app):
|
||||
"""This is used to set up session for your app object.
|
||||
|
||||
:param app: the Flask app object with proper configuration.
|
||||
"""
|
||||
app.session_interface = self._get_interface(app)
|
||||
|
||||
def _get_interface(self, app):
|
||||
config = app.config.copy()
|
||||
config.setdefault('SESSION_TYPE', 'null')
|
||||
config.setdefault('SESSION_PERMANENT', True)
|
||||
config.setdefault('SESSION_USE_SIGNER', False)
|
||||
config.setdefault('SESSION_KEY_PREFIX', 'session:')
|
||||
config.setdefault('SESSION_REDIS', None)
|
||||
config.setdefault('SESSION_MEMCACHED', None)
|
||||
config.setdefault('SESSION_FILE_DIR',
|
||||
os.path.join(os.getcwd(), 'flask_session'))
|
||||
config.setdefault('SESSION_FILE_THRESHOLD', 500)
|
||||
config.setdefault('SESSION_FILE_MODE', 384)
|
||||
config.setdefault('SESSION_MONGODB', None)
|
||||
config.setdefault('SESSION_MONGODB_DB', 'flask_session')
|
||||
config.setdefault('SESSION_MONGODB_COLLECT', 'sessions')
|
||||
config.setdefault('SESSION_SQLALCHEMY', None)
|
||||
config.setdefault('SESSION_SQLALCHEMY_TABLE', 'sessions')
|
||||
|
||||
if config['SESSION_TYPE'] == 'redis':
|
||||
session_interface = RedisSessionInterface(
|
||||
config['SESSION_REDIS'], config['SESSION_KEY_PREFIX'],
|
||||
config['SESSION_USE_SIGNER'], config['SESSION_PERMANENT'])
|
||||
elif config['SESSION_TYPE'] == 'memcached':
|
||||
session_interface = MemcachedSessionInterface(
|
||||
config['SESSION_MEMCACHED'], config['SESSION_KEY_PREFIX'],
|
||||
config['SESSION_USE_SIGNER'], config['SESSION_PERMANENT'])
|
||||
elif config['SESSION_TYPE'] == 'filesystem':
|
||||
session_interface = FileSystemSessionInterface(
|
||||
config['SESSION_FILE_DIR'], config['SESSION_FILE_THRESHOLD'],
|
||||
config['SESSION_FILE_MODE'], config['SESSION_KEY_PREFIX'],
|
||||
config['SESSION_USE_SIGNER'], config['SESSION_PERMANENT'])
|
||||
elif config['SESSION_TYPE'] == 'mongodb':
|
||||
session_interface = MongoDBSessionInterface(
|
||||
config['SESSION_MONGODB'], config['SESSION_MONGODB_DB'],
|
||||
config['SESSION_MONGODB_COLLECT'],
|
||||
config['SESSION_KEY_PREFIX'], config['SESSION_USE_SIGNER'],
|
||||
config['SESSION_PERMANENT'])
|
||||
elif config['SESSION_TYPE'] == 'sqlalchemy':
|
||||
session_interface = SqlAlchemySessionInterface(
|
||||
app, config['SESSION_SQLALCHEMY'],
|
||||
config['SESSION_SQLALCHEMY_TABLE'],
|
||||
config['SESSION_KEY_PREFIX'], config['SESSION_USE_SIGNER'],
|
||||
config['SESSION_PERMANENT'])
|
||||
else:
|
||||
session_interface = NullSessionInterface()
|
||||
|
||||
return session_interface
|
Binary file not shown.
Binary file not shown.
576
venv/lib/python3.11/site-packages/flask_session/sessions.py
Normal file
576
venv/lib/python3.11/site-packages/flask_session/sessions.py
Normal file
|
@ -0,0 +1,576 @@
|
|||
import sys
|
||||
import time
|
||||
from datetime import datetime
|
||||
from uuid import uuid4
|
||||
try:
|
||||
import cPickle as pickle
|
||||
except ImportError:
|
||||
import pickle
|
||||
|
||||
from flask.sessions import SessionInterface as FlaskSessionInterface
|
||||
from flask.sessions import SessionMixin
|
||||
from werkzeug.datastructures import CallbackDict
|
||||
from itsdangerous import Signer, BadSignature, want_bytes
|
||||
|
||||
|
||||
PY2 = sys.version_info[0] == 2
|
||||
if not PY2:
|
||||
text_type = str
|
||||
else:
|
||||
text_type = unicode
|
||||
|
||||
|
||||
def total_seconds(td):
|
||||
return td.days * 60 * 60 * 24 + td.seconds
|
||||
|
||||
|
||||
class ServerSideSession(CallbackDict, SessionMixin):
|
||||
"""Baseclass for server-side based sessions."""
|
||||
|
||||
def __init__(self, initial=None, sid=None, permanent=None):
|
||||
def on_update(self):
|
||||
self.modified = True
|
||||
CallbackDict.__init__(self, initial, on_update)
|
||||
self.sid = sid
|
||||
if permanent:
|
||||
self.permanent = permanent
|
||||
self.modified = False
|
||||
|
||||
|
||||
class RedisSession(ServerSideSession):
|
||||
pass
|
||||
|
||||
|
||||
class MemcachedSession(ServerSideSession):
|
||||
pass
|
||||
|
||||
|
||||
class FileSystemSession(ServerSideSession):
|
||||
pass
|
||||
|
||||
|
||||
class MongoDBSession(ServerSideSession):
|
||||
pass
|
||||
|
||||
|
||||
class SqlAlchemySession(ServerSideSession):
|
||||
pass
|
||||
|
||||
|
||||
class SessionInterface(FlaskSessionInterface):
|
||||
|
||||
def _generate_sid(self):
|
||||
return str(uuid4())
|
||||
|
||||
def _get_signer(self, app):
|
||||
if not app.secret_key:
|
||||
return None
|
||||
return Signer(app.secret_key, salt='flask-session',
|
||||
key_derivation='hmac')
|
||||
|
||||
|
||||
class NullSessionInterface(SessionInterface):
|
||||
"""Used to open a :class:`flask.sessions.NullSession` instance.
|
||||
"""
|
||||
|
||||
def open_session(self, app, request):
|
||||
return None
|
||||
|
||||
|
||||
class RedisSessionInterface(SessionInterface):
|
||||
"""Uses the Redis key-value store as a session backend.
|
||||
|
||||
.. versionadded:: 0.2
|
||||
The `use_signer` parameter was added.
|
||||
|
||||
:param redis: A ``redis.Redis`` instance.
|
||||
:param key_prefix: A prefix that is added to all Redis store keys.
|
||||
:param use_signer: Whether to sign the session id cookie or not.
|
||||
:param permanent: Whether to use permanent session or not.
|
||||
"""
|
||||
|
||||
serializer = pickle
|
||||
session_class = RedisSession
|
||||
|
||||
def __init__(self, redis, key_prefix, use_signer=False, permanent=True):
|
||||
if redis is None:
|
||||
from redis import Redis
|
||||
redis = Redis()
|
||||
self.redis = redis
|
||||
self.key_prefix = key_prefix
|
||||
self.use_signer = use_signer
|
||||
self.permanent = permanent
|
||||
self.has_same_site_capability = hasattr(self, "get_cookie_samesite")
|
||||
|
||||
def open_session(self, app, request):
|
||||
sid = request.cookies.get(app.config["SESSION_COOKIE_NAME"])
|
||||
if not sid:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
if self.use_signer:
|
||||
signer = self._get_signer(app)
|
||||
if signer is None:
|
||||
return None
|
||||
try:
|
||||
sid_as_bytes = signer.unsign(sid)
|
||||
sid = sid_as_bytes.decode()
|
||||
except BadSignature:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
if not PY2 and not isinstance(sid, text_type):
|
||||
sid = sid.decode('utf-8', 'strict')
|
||||
val = self.redis.get(self.key_prefix + sid)
|
||||
if val is not None:
|
||||
try:
|
||||
data = self.serializer.loads(val)
|
||||
return self.session_class(data, sid=sid)
|
||||
except:
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
def save_session(self, app, session, response):
|
||||
domain = self.get_cookie_domain(app)
|
||||
path = self.get_cookie_path(app)
|
||||
if not session:
|
||||
if session.modified:
|
||||
self.redis.delete(self.key_prefix + session.sid)
|
||||
response.delete_cookie(app.config["SESSION_COOKIE_NAME"],
|
||||
domain=domain, path=path)
|
||||
return
|
||||
|
||||
# Modification case. There are upsides and downsides to
|
||||
# emitting a set-cookie header each request. The behavior
|
||||
# is controlled by the :meth:`should_set_cookie` method
|
||||
# which performs a quick check to figure out if the cookie
|
||||
# should be set or not. This is controlled by the
|
||||
# SESSION_REFRESH_EACH_REQUEST config flag as well as
|
||||
# the permanent flag on the session itself.
|
||||
# if not self.should_set_cookie(app, session):
|
||||
# return
|
||||
conditional_cookie_kwargs = {}
|
||||
httponly = self.get_cookie_httponly(app)
|
||||
secure = self.get_cookie_secure(app)
|
||||
if self.has_same_site_capability:
|
||||
conditional_cookie_kwargs["samesite"] = self.get_cookie_samesite(app)
|
||||
expires = self.get_expiration_time(app, session)
|
||||
val = self.serializer.dumps(dict(session))
|
||||
self.redis.setex(name=self.key_prefix + session.sid, value=val,
|
||||
time=total_seconds(app.permanent_session_lifetime))
|
||||
if self.use_signer:
|
||||
session_id = self._get_signer(app).sign(want_bytes(session.sid))
|
||||
else:
|
||||
session_id = session.sid
|
||||
response.set_cookie(app.config["SESSION_COOKIE_NAME"], session_id,
|
||||
expires=expires, httponly=httponly,
|
||||
domain=domain, path=path, secure=secure,
|
||||
**conditional_cookie_kwargs)
|
||||
|
||||
|
||||
class MemcachedSessionInterface(SessionInterface):
|
||||
"""A Session interface that uses memcached as backend.
|
||||
|
||||
.. versionadded:: 0.2
|
||||
The `use_signer` parameter was added.
|
||||
|
||||
:param client: A ``memcache.Client`` instance.
|
||||
:param key_prefix: A prefix that is added to all Memcached store keys.
|
||||
:param use_signer: Whether to sign the session id cookie or not.
|
||||
:param permanent: Whether to use permanent session or not.
|
||||
"""
|
||||
|
||||
serializer = pickle
|
||||
session_class = MemcachedSession
|
||||
|
||||
def __init__(self, client, key_prefix, use_signer=False, permanent=True):
|
||||
if client is None:
|
||||
client = self._get_preferred_memcache_client()
|
||||
if client is None:
|
||||
raise RuntimeError('no memcache module found')
|
||||
self.client = client
|
||||
self.key_prefix = key_prefix
|
||||
self.use_signer = use_signer
|
||||
self.permanent = permanent
|
||||
self.has_same_site_capability = hasattr(self, "get_cookie_samesite")
|
||||
|
||||
def _get_preferred_memcache_client(self):
|
||||
servers = ['127.0.0.1:11211']
|
||||
try:
|
||||
import pylibmc
|
||||
except ImportError:
|
||||
pass
|
||||
else:
|
||||
return pylibmc.Client(servers)
|
||||
|
||||
try:
|
||||
import memcache
|
||||
except ImportError:
|
||||
pass
|
||||
else:
|
||||
return memcache.Client(servers)
|
||||
|
||||
def _get_memcache_timeout(self, timeout):
|
||||
"""
|
||||
Memcached deals with long (> 30 days) timeouts in a special
|
||||
way. Call this function to obtain a safe value for your timeout.
|
||||
"""
|
||||
if timeout > 2592000: # 60*60*24*30, 30 days
|
||||
# See http://code.google.com/p/memcached/wiki/FAQ
|
||||
# "You can set expire times up to 30 days in the future. After that
|
||||
# memcached interprets it as a date, and will expire the item after
|
||||
# said date. This is a simple (but obscure) mechanic."
|
||||
#
|
||||
# This means that we have to switch to absolute timestamps.
|
||||
timeout += int(time.time())
|
||||
return timeout
|
||||
|
||||
def open_session(self, app, request):
|
||||
sid = request.cookies.get(app.config["SESSION_COOKIE_NAME"])
|
||||
if not sid:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
if self.use_signer:
|
||||
signer = self._get_signer(app)
|
||||
if signer is None:
|
||||
return None
|
||||
try:
|
||||
sid_as_bytes = signer.unsign(sid)
|
||||
sid = sid_as_bytes.decode()
|
||||
except BadSignature:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
full_session_key = self.key_prefix + sid
|
||||
if PY2 and isinstance(full_session_key, unicode):
|
||||
full_session_key = full_session_key.encode('utf-8')
|
||||
val = self.client.get(full_session_key)
|
||||
if val is not None:
|
||||
try:
|
||||
if not PY2:
|
||||
val = want_bytes(val)
|
||||
data = self.serializer.loads(val)
|
||||
return self.session_class(data, sid=sid)
|
||||
except:
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
def save_session(self, app, session, response):
|
||||
domain = self.get_cookie_domain(app)
|
||||
path = self.get_cookie_path(app)
|
||||
full_session_key = self.key_prefix + session.sid
|
||||
if PY2 and isinstance(full_session_key, unicode):
|
||||
full_session_key = full_session_key.encode('utf-8')
|
||||
if not session:
|
||||
if session.modified:
|
||||
self.client.delete(full_session_key)
|
||||
response.delete_cookie(app.config["SESSION_COOKIE_NAME"],
|
||||
domain=domain, path=path)
|
||||
return
|
||||
|
||||
conditional_cookie_kwargs = {}
|
||||
httponly = self.get_cookie_httponly(app)
|
||||
secure = self.get_cookie_secure(app)
|
||||
if self.has_same_site_capability:
|
||||
conditional_cookie_kwargs["samesite"] = self.get_cookie_samesite(app)
|
||||
expires = self.get_expiration_time(app, session)
|
||||
if not PY2:
|
||||
val = self.serializer.dumps(dict(session), 0)
|
||||
else:
|
||||
val = self.serializer.dumps(dict(session))
|
||||
self.client.set(full_session_key, val, self._get_memcache_timeout(
|
||||
total_seconds(app.permanent_session_lifetime)))
|
||||
if self.use_signer:
|
||||
session_id = self._get_signer(app).sign(want_bytes(session.sid))
|
||||
else:
|
||||
session_id = session.sid
|
||||
response.set_cookie(app.config["SESSION_COOKIE_NAME"], session_id,
|
||||
expires=expires, httponly=httponly,
|
||||
domain=domain, path=path, secure=secure,
|
||||
**conditional_cookie_kwargs)
|
||||
|
||||
|
||||
class FileSystemSessionInterface(SessionInterface):
|
||||
"""Uses the :class:`cachelib.file.FileSystemCache` as a session backend.
|
||||
|
||||
.. versionadded:: 0.2
|
||||
The `use_signer` parameter was added.
|
||||
|
||||
:param cache_dir: the directory where session files are stored.
|
||||
:param threshold: the maximum number of items the session stores before it
|
||||
starts deleting some.
|
||||
:param mode: the file mode wanted for the session files, default 0600
|
||||
:param key_prefix: A prefix that is added to FileSystemCache store keys.
|
||||
:param use_signer: Whether to sign the session id cookie or not.
|
||||
:param permanent: Whether to use permanent session or not.
|
||||
"""
|
||||
|
||||
session_class = FileSystemSession
|
||||
|
||||
def __init__(self, cache_dir, threshold, mode, key_prefix,
|
||||
use_signer=False, permanent=True):
|
||||
from cachelib.file import FileSystemCache
|
||||
self.cache = FileSystemCache(cache_dir, threshold=threshold, mode=mode)
|
||||
self.key_prefix = key_prefix
|
||||
self.use_signer = use_signer
|
||||
self.permanent = permanent
|
||||
self.has_same_site_capability = hasattr(self, "get_cookie_samesite")
|
||||
|
||||
def open_session(self, app, request):
|
||||
sid = request.cookies.get(app.config["SESSION_COOKIE_NAME"])
|
||||
if not sid:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
if self.use_signer:
|
||||
signer = self._get_signer(app)
|
||||
if signer is None:
|
||||
return None
|
||||
try:
|
||||
sid_as_bytes = signer.unsign(sid)
|
||||
sid = sid_as_bytes.decode()
|
||||
except BadSignature:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
data = self.cache.get(self.key_prefix + sid)
|
||||
if data is not None:
|
||||
return self.session_class(data, sid=sid)
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
def save_session(self, app, session, response):
|
||||
domain = self.get_cookie_domain(app)
|
||||
path = self.get_cookie_path(app)
|
||||
if not session:
|
||||
if session.modified:
|
||||
self.cache.delete(self.key_prefix + session.sid)
|
||||
response.delete_cookie(app.config["SESSION_COOKIE_NAME"],
|
||||
domain=domain, path=path)
|
||||
return
|
||||
|
||||
conditional_cookie_kwargs = {}
|
||||
httponly = self.get_cookie_httponly(app)
|
||||
secure = self.get_cookie_secure(app)
|
||||
if self.has_same_site_capability:
|
||||
conditional_cookie_kwargs["samesite"] = self.get_cookie_samesite(app)
|
||||
expires = self.get_expiration_time(app, session)
|
||||
data = dict(session)
|
||||
self.cache.set(self.key_prefix + session.sid, data,
|
||||
total_seconds(app.permanent_session_lifetime))
|
||||
if self.use_signer:
|
||||
session_id = self._get_signer(app).sign(want_bytes(session.sid))
|
||||
else:
|
||||
session_id = session.sid
|
||||
response.set_cookie(app.config["SESSION_COOKIE_NAME"], session_id,
|
||||
expires=expires, httponly=httponly,
|
||||
domain=domain, path=path, secure=secure,
|
||||
**conditional_cookie_kwargs)
|
||||
|
||||
|
||||
class MongoDBSessionInterface(SessionInterface):
|
||||
"""A Session interface that uses mongodb as backend.
|
||||
|
||||
.. versionadded:: 0.2
|
||||
The `use_signer` parameter was added.
|
||||
|
||||
:param client: A ``pymongo.MongoClient`` instance.
|
||||
:param db: The database you want to use.
|
||||
:param collection: The collection you want to use.
|
||||
:param key_prefix: A prefix that is added to all MongoDB store keys.
|
||||
:param use_signer: Whether to sign the session id cookie or not.
|
||||
:param permanent: Whether to use permanent session or not.
|
||||
"""
|
||||
|
||||
serializer = pickle
|
||||
session_class = MongoDBSession
|
||||
|
||||
def __init__(self, client, db, collection, key_prefix, use_signer=False,
|
||||
permanent=True):
|
||||
if client is None:
|
||||
from pymongo import MongoClient
|
||||
client = MongoClient()
|
||||
self.client = client
|
||||
self.store = client[db][collection]
|
||||
self.key_prefix = key_prefix
|
||||
self.use_signer = use_signer
|
||||
self.permanent = permanent
|
||||
self.has_same_site_capability = hasattr(self, "get_cookie_samesite")
|
||||
|
||||
def open_session(self, app, request):
|
||||
sid = request.cookies.get(app.config["SESSION_COOKIE_NAME"])
|
||||
if not sid:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
if self.use_signer:
|
||||
signer = self._get_signer(app)
|
||||
if signer is None:
|
||||
return None
|
||||
try:
|
||||
sid_as_bytes = signer.unsign(sid)
|
||||
sid = sid_as_bytes.decode()
|
||||
except BadSignature:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
store_id = self.key_prefix + sid
|
||||
document = self.store.find_one({'id': store_id})
|
||||
if document and document.get('expiration') <= datetime.utcnow():
|
||||
# Delete expired session
|
||||
self.store.remove({'id': store_id})
|
||||
document = None
|
||||
if document is not None:
|
||||
try:
|
||||
val = document['val']
|
||||
data = self.serializer.loads(want_bytes(val))
|
||||
return self.session_class(data, sid=sid)
|
||||
except:
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
def save_session(self, app, session, response):
|
||||
domain = self.get_cookie_domain(app)
|
||||
path = self.get_cookie_path(app)
|
||||
store_id = self.key_prefix + session.sid
|
||||
if not session:
|
||||
if session.modified:
|
||||
self.store.remove({'id': store_id})
|
||||
response.delete_cookie(app.config["SESSION_COOKIE_NAME"],
|
||||
domain=domain, path=path)
|
||||
return
|
||||
|
||||
conditional_cookie_kwargs = {}
|
||||
httponly = self.get_cookie_httponly(app)
|
||||
secure = self.get_cookie_secure(app)
|
||||
if self.has_same_site_capability:
|
||||
conditional_cookie_kwargs["samesite"] = self.get_cookie_samesite(app)
|
||||
expires = self.get_expiration_time(app, session)
|
||||
val = self.serializer.dumps(dict(session))
|
||||
self.store.update({'id': store_id},
|
||||
{'id': store_id,
|
||||
'val': val,
|
||||
'expiration': expires}, True)
|
||||
if self.use_signer:
|
||||
session_id = self._get_signer(app).sign(want_bytes(session.sid))
|
||||
else:
|
||||
session_id = session.sid
|
||||
response.set_cookie(app.config["SESSION_COOKIE_NAME"], session_id,
|
||||
expires=expires, httponly=httponly,
|
||||
domain=domain, path=path, secure=secure,
|
||||
**conditional_cookie_kwargs)
|
||||
|
||||
|
||||
class SqlAlchemySessionInterface(SessionInterface):
|
||||
"""Uses the Flask-SQLAlchemy from a flask app as a session backend.
|
||||
|
||||
.. versionadded:: 0.2
|
||||
|
||||
:param app: A Flask app instance.
|
||||
:param db: A Flask-SQLAlchemy instance.
|
||||
:param table: The table name you want to use.
|
||||
:param key_prefix: A prefix that is added to all store keys.
|
||||
:param use_signer: Whether to sign the session id cookie or not.
|
||||
:param permanent: Whether to use permanent session or not.
|
||||
"""
|
||||
|
||||
serializer = pickle
|
||||
session_class = SqlAlchemySession
|
||||
|
||||
def __init__(self, app, db, table, key_prefix, use_signer=False,
|
||||
permanent=True):
|
||||
if db is None:
|
||||
from flask_sqlalchemy import SQLAlchemy
|
||||
db = SQLAlchemy(app)
|
||||
self.db = db
|
||||
self.key_prefix = key_prefix
|
||||
self.use_signer = use_signer
|
||||
self.permanent = permanent
|
||||
self.has_same_site_capability = hasattr(self, "get_cookie_samesite")
|
||||
|
||||
class Session(self.db.Model):
|
||||
__tablename__ = table
|
||||
|
||||
id = self.db.Column(self.db.Integer, primary_key=True)
|
||||
session_id = self.db.Column(self.db.String(255), unique=True)
|
||||
data = self.db.Column(self.db.LargeBinary)
|
||||
expiry = self.db.Column(self.db.DateTime)
|
||||
|
||||
def __init__(self, session_id, data, expiry):
|
||||
self.session_id = session_id
|
||||
self.data = data
|
||||
self.expiry = expiry
|
||||
|
||||
def __repr__(self):
|
||||
return '<Session data %s>' % self.data
|
||||
|
||||
# self.db.create_all()
|
||||
self.sql_session_model = Session
|
||||
|
||||
def open_session(self, app, request):
|
||||
sid = request.cookies.get(app.config["SESSION_COOKIE_NAME"])
|
||||
if not sid:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
if self.use_signer:
|
||||
signer = self._get_signer(app)
|
||||
if signer is None:
|
||||
return None
|
||||
try:
|
||||
sid_as_bytes = signer.unsign(sid)
|
||||
sid = sid_as_bytes.decode()
|
||||
except BadSignature:
|
||||
sid = self._generate_sid()
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
store_id = self.key_prefix + sid
|
||||
saved_session = self.sql_session_model.query.filter_by(
|
||||
session_id=store_id).first()
|
||||
if saved_session and saved_session.expiry <= datetime.utcnow():
|
||||
# Delete expired session
|
||||
self.db.session.delete(saved_session)
|
||||
self.db.session.commit()
|
||||
saved_session = None
|
||||
if saved_session:
|
||||
try:
|
||||
val = saved_session.data
|
||||
data = self.serializer.loads(want_bytes(val))
|
||||
return self.session_class(data, sid=sid)
|
||||
except:
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
return self.session_class(sid=sid, permanent=self.permanent)
|
||||
|
||||
def save_session(self, app, session, response):
|
||||
domain = self.get_cookie_domain(app)
|
||||
path = self.get_cookie_path(app)
|
||||
store_id = self.key_prefix + session.sid
|
||||
saved_session = self.sql_session_model.query.filter_by(
|
||||
session_id=store_id).first()
|
||||
if not session:
|
||||
if session.modified:
|
||||
if saved_session:
|
||||
self.db.session.delete(saved_session)
|
||||
self.db.session.commit()
|
||||
response.delete_cookie(app.config["SESSION_COOKIE_NAME"],
|
||||
domain=domain, path=path)
|
||||
return
|
||||
|
||||
conditional_cookie_kwargs = {}
|
||||
httponly = self.get_cookie_httponly(app)
|
||||
secure = self.get_cookie_secure(app)
|
||||
if self.has_same_site_capability:
|
||||
conditional_cookie_kwargs["samesite"] = self.get_cookie_samesite(app)
|
||||
expires = self.get_expiration_time(app, session)
|
||||
val = self.serializer.dumps(dict(session))
|
||||
if saved_session:
|
||||
saved_session.data = val
|
||||
saved_session.expiry = expires
|
||||
self.db.session.commit()
|
||||
else:
|
||||
new_session = self.sql_session_model(store_id, val, expires)
|
||||
self.db.session.add(new_session)
|
||||
self.db.session.commit()
|
||||
if self.use_signer:
|
||||
session_id = self._get_signer(app).sign(want_bytes(session.sid))
|
||||
else:
|
||||
session_id = session.sid
|
||||
response.set_cookie(app.config["SESSION_COOKIE_NAME"], session_id,
|
||||
expires=expires, httponly=httponly,
|
||||
domain=domain, path=path, secure=secure,
|
||||
**conditional_cookie_kwargs)
|
Loading…
Add table
Add a link
Reference in a new issue