base.py 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365
  1. import logging
  2. import string
  3. from datetime import datetime, timedelta
  4. from django.conf import settings
  5. from django.core import signing
  6. from django.utils import timezone
  7. from django.utils.crypto import get_random_string
  8. from django.utils.module_loading import import_string
  9. # session_key should not be case sensitive because some backends can store it
  10. # on case insensitive file systems.
  11. VALID_KEY_CHARS = string.ascii_lowercase + string.digits
  12. class CreateError(Exception):
  13. """
  14. Used internally as a consistent exception type to catch from save (see the
  15. docstring for SessionBase.save() for details).
  16. """
  17. pass
  18. class UpdateError(Exception):
  19. """
  20. Occurs if Django tries to update a session that was deleted.
  21. """
  22. pass
  23. class SessionBase:
  24. """
  25. Base class for all Session classes.
  26. """
  27. TEST_COOKIE_NAME = "testcookie"
  28. TEST_COOKIE_VALUE = "worked"
  29. __not_given = object()
  30. def __init__(self, session_key=None):
  31. self._session_key = session_key
  32. self.accessed = False
  33. self.modified = False
  34. self.serializer = import_string(settings.SESSION_SERIALIZER)
  35. def __contains__(self, key):
  36. return key in self._session
  37. def __getitem__(self, key):
  38. return self._session[key]
  39. def __setitem__(self, key, value):
  40. self._session[key] = value
  41. self.modified = True
  42. def __delitem__(self, key):
  43. del self._session[key]
  44. self.modified = True
  45. @property
  46. def key_salt(self):
  47. return "django.contrib.sessions." + self.__class__.__qualname__
  48. def get(self, key, default=None):
  49. return self._session.get(key, default)
  50. def pop(self, key, default=__not_given):
  51. self.modified = self.modified or key in self._session
  52. args = () if default is self.__not_given else (default,)
  53. return self._session.pop(key, *args)
  54. def setdefault(self, key, value):
  55. if key in self._session:
  56. return self._session[key]
  57. else:
  58. self.modified = True
  59. self._session[key] = value
  60. return value
  61. def set_test_cookie(self):
  62. self[self.TEST_COOKIE_NAME] = self.TEST_COOKIE_VALUE
  63. def test_cookie_worked(self):
  64. return self.get(self.TEST_COOKIE_NAME) == self.TEST_COOKIE_VALUE
  65. def delete_test_cookie(self):
  66. del self[self.TEST_COOKIE_NAME]
  67. def encode(self, session_dict):
  68. "Return the given session dictionary serialized and encoded as a string."
  69. return signing.dumps(
  70. session_dict,
  71. salt=self.key_salt,
  72. serializer=self.serializer,
  73. compress=True,
  74. )
  75. def decode(self, session_data):
  76. try:
  77. return signing.loads(
  78. session_data, salt=self.key_salt, serializer=self.serializer
  79. )
  80. except signing.BadSignature:
  81. logger = logging.getLogger("django.security.SuspiciousSession")
  82. logger.warning("Session data corrupted")
  83. except Exception:
  84. # ValueError, unpickling exceptions. If any of these happen, just
  85. # return an empty dictionary (an empty session).
  86. pass
  87. return {}
  88. def update(self, dict_):
  89. self._session.update(dict_)
  90. self.modified = True
  91. def has_key(self, key):
  92. return key in self._session
  93. def keys(self):
  94. return self._session.keys()
  95. def values(self):
  96. return self._session.values()
  97. def items(self):
  98. return self._session.items()
  99. def clear(self):
  100. # To avoid unnecessary persistent storage accesses, we set up the
  101. # internals directly (loading data wastes time, since we are going to
  102. # set it to an empty dict anyway).
  103. self._session_cache = {}
  104. self.accessed = True
  105. self.modified = True
  106. def is_empty(self):
  107. "Return True when there is no session_key and the session is empty."
  108. try:
  109. return not self._session_key and not self._session_cache
  110. except AttributeError:
  111. return True
  112. def _get_new_session_key(self):
  113. "Return session key that isn't being used."
  114. while True:
  115. session_key = get_random_string(32, VALID_KEY_CHARS)
  116. if not self.exists(session_key):
  117. return session_key
  118. def _get_or_create_session_key(self):
  119. if self._session_key is None:
  120. self._session_key = self._get_new_session_key()
  121. return self._session_key
  122. def _validate_session_key(self, key):
  123. """
  124. Key must be truthy and at least 8 characters long. 8 characters is an
  125. arbitrary lower bound for some minimal key security.
  126. """
  127. return key and len(key) >= 8
  128. def _get_session_key(self):
  129. return self.__session_key
  130. def _set_session_key(self, value):
  131. """
  132. Validate session key on assignment. Invalid values will set to None.
  133. """
  134. if self._validate_session_key(value):
  135. self.__session_key = value
  136. else:
  137. self.__session_key = None
  138. session_key = property(_get_session_key)
  139. _session_key = property(_get_session_key, _set_session_key)
  140. def _get_session(self, no_load=False):
  141. """
  142. Lazily load session from storage (unless "no_load" is True, when only
  143. an empty dict is stored) and store it in the current instance.
  144. """
  145. self.accessed = True
  146. try:
  147. return self._session_cache
  148. except AttributeError:
  149. if self.session_key is None or no_load:
  150. self._session_cache = {}
  151. else:
  152. self._session_cache = self.load()
  153. return self._session_cache
  154. _session = property(_get_session)
  155. def get_session_cookie_age(self):
  156. return settings.SESSION_COOKIE_AGE
  157. def get_expiry_age(self, **kwargs):
  158. """Get the number of seconds until the session expires.
  159. Optionally, this function accepts `modification` and `expiry` keyword
  160. arguments specifying the modification and expiry of the session.
  161. """
  162. try:
  163. modification = kwargs["modification"]
  164. except KeyError:
  165. modification = timezone.now()
  166. # Make the difference between "expiry=None passed in kwargs" and
  167. # "expiry not passed in kwargs", in order to guarantee not to trigger
  168. # self.load() when expiry is provided.
  169. try:
  170. expiry = kwargs["expiry"]
  171. except KeyError:
  172. expiry = self.get("_session_expiry")
  173. if not expiry: # Checks both None and 0 cases
  174. return self.get_session_cookie_age()
  175. if not isinstance(expiry, (datetime, str)):
  176. return expiry
  177. if isinstance(expiry, str):
  178. expiry = datetime.fromisoformat(expiry)
  179. delta = expiry - modification
  180. return delta.days * 86400 + delta.seconds
  181. def get_expiry_date(self, **kwargs):
  182. """Get session the expiry date (as a datetime object).
  183. Optionally, this function accepts `modification` and `expiry` keyword
  184. arguments specifying the modification and expiry of the session.
  185. """
  186. try:
  187. modification = kwargs["modification"]
  188. except KeyError:
  189. modification = timezone.now()
  190. # Same comment as in get_expiry_age
  191. try:
  192. expiry = kwargs["expiry"]
  193. except KeyError:
  194. expiry = self.get("_session_expiry")
  195. if isinstance(expiry, datetime):
  196. return expiry
  197. elif isinstance(expiry, str):
  198. return datetime.fromisoformat(expiry)
  199. expiry = expiry or self.get_session_cookie_age()
  200. return modification + timedelta(seconds=expiry)
  201. def set_expiry(self, value):
  202. """
  203. Set a custom expiration for the session. ``value`` can be an integer,
  204. a Python ``datetime`` or ``timedelta`` object or ``None``.
  205. If ``value`` is an integer, the session will expire after that many
  206. seconds of inactivity. If set to ``0`` then the session will expire on
  207. browser close.
  208. If ``value`` is a ``datetime`` or ``timedelta`` object, the session
  209. will expire at that specific future time.
  210. If ``value`` is ``None``, the session uses the global session expiry
  211. policy.
  212. """
  213. if value is None:
  214. # Remove any custom expiration for this session.
  215. try:
  216. del self["_session_expiry"]
  217. except KeyError:
  218. pass
  219. return
  220. if isinstance(value, timedelta):
  221. value = timezone.now() + value
  222. if isinstance(value, datetime):
  223. value = value.isoformat()
  224. self["_session_expiry"] = value
  225. def get_expire_at_browser_close(self):
  226. """
  227. Return ``True`` if the session is set to expire when the browser
  228. closes, and ``False`` if there's an expiry date. Use
  229. ``get_expiry_date()`` or ``get_expiry_age()`` to find the actual expiry
  230. date/age, if there is one.
  231. """
  232. if (expiry := self.get("_session_expiry")) is None:
  233. return settings.SESSION_EXPIRE_AT_BROWSER_CLOSE
  234. return expiry == 0
  235. def flush(self):
  236. """
  237. Remove the current session data from the database and regenerate the
  238. key.
  239. """
  240. self.clear()
  241. self.delete()
  242. self._session_key = None
  243. def cycle_key(self):
  244. """
  245. Create a new session key, while retaining the current session data.
  246. """
  247. data = self._session
  248. key = self.session_key
  249. self.create()
  250. self._session_cache = data
  251. if key:
  252. self.delete(key)
  253. # Methods that child classes must implement.
  254. def exists(self, session_key):
  255. """
  256. Return True if the given session_key already exists.
  257. """
  258. raise NotImplementedError(
  259. "subclasses of SessionBase must provide an exists() method"
  260. )
  261. def create(self):
  262. """
  263. Create a new session instance. Guaranteed to create a new object with
  264. a unique key and will have saved the result once (with empty data)
  265. before the method returns.
  266. """
  267. raise NotImplementedError(
  268. "subclasses of SessionBase must provide a create() method"
  269. )
  270. def save(self, must_create=False):
  271. """
  272. Save the session data. If 'must_create' is True, create a new session
  273. object (or raise CreateError). Otherwise, only update an existing
  274. object and don't create one (raise UpdateError if needed).
  275. """
  276. raise NotImplementedError(
  277. "subclasses of SessionBase must provide a save() method"
  278. )
  279. def delete(self, session_key=None):
  280. """
  281. Delete the session data under this key. If the key is None, use the
  282. current session key value.
  283. """
  284. raise NotImplementedError(
  285. "subclasses of SessionBase must provide a delete() method"
  286. )
  287. def load(self):
  288. """
  289. Load the session data and return a dictionary.
  290. """
  291. raise NotImplementedError(
  292. "subclasses of SessionBase must provide a load() method"
  293. )
  294. @classmethod
  295. def clear_expired(cls):
  296. """
  297. Remove expired sessions from the session store.
  298. If this operation isn't possible on a given backend, it should raise
  299. NotImplementedError. If it isn't necessary, because the backend has
  300. a built-in expiration mechanism, it should be a no-op.
  301. """
  302. raise NotImplementedError("This backend does not support clear_expired().")