62 lines
3.0 KiB
Python
62 lines
3.0 KiB
Python
import base64, md5, random, sys
|
|
import cPickle as pickle
|
|
from django.db import models
|
|
from django.utils.translation import gettext_lazy as _
|
|
from django.conf import settings
|
|
|
|
class SessionManager(models.Manager):
|
|
def encode(self, session_dict):
|
|
"Returns the given session dictionary pickled and encoded as a string."
|
|
pickled = pickle.dumps(session_dict)
|
|
pickled_md5 = md5.new(pickled + settings.SECRET_KEY).hexdigest()
|
|
return base64.encodestring(pickled + pickled_md5)
|
|
|
|
def get_new_session_key(self):
|
|
"Returns session key that isn't being used."
|
|
# The random module is seeded when this Apache child is created.
|
|
# Use person_id and SECRET_KEY as added salt.
|
|
while 1:
|
|
session_key = md5.new(str(random.randint(0, sys.maxint - 1)) + str(random.randint(0, sys.maxint - 1)) + settings.SECRET_KEY).hexdigest()
|
|
try:
|
|
self.get(session_key=session_key)
|
|
except self.model.DoesNotExist:
|
|
break
|
|
return session_key
|
|
|
|
def save(self, session_key, session_dict, expire_date):
|
|
s = self.model(session_key, self.encode(session_dict), expire_date)
|
|
if session_dict:
|
|
s.save()
|
|
else:
|
|
s.delete() # Clear sessions with no data.
|
|
return s
|
|
|
|
class Session(models.Model):
|
|
"""Django provides full support for anonymous sessions. The session framework lets you store and retrieve arbitrary data on a per-site-visitor basis. It stores data on the server side and abstracts the sending and receiving of cookies. Cookies contain a session ID -- not the data itself.
|
|
|
|
The Django sessions framework is entirely cookie-based. It does not fall back to putting session IDs in URLs. This is an intentional design decision. Not only does that behavior make URLs ugly, it makes your site vulnerable to session-ID theft via the "Referer" header.
|
|
|
|
For complete documentation on using Sessions in your code, consult the sessions documentation that is shipped with Django (also available on the Django website).
|
|
"""
|
|
session_key = models.CharField(_('session key'), maxlength=40, primary_key=True)
|
|
session_data = models.TextField(_('session data'))
|
|
expire_date = models.DateTimeField(_('expire date'))
|
|
objects = SessionManager()
|
|
class Meta:
|
|
db_table = 'django_session'
|
|
verbose_name = _('session')
|
|
verbose_name_plural = _('sessions')
|
|
|
|
def get_decoded(self):
|
|
encoded_data = base64.decodestring(self.session_data)
|
|
pickled, tamper_check = encoded_data[:-32], encoded_data[-32:]
|
|
if md5.new(pickled + settings.SECRET_KEY).hexdigest() != tamper_check:
|
|
from django.core.exceptions import SuspiciousOperation
|
|
raise SuspiciousOperation, "User tampered with session cookie."
|
|
try:
|
|
return pickle.loads(pickled)
|
|
# Unpickling can cause a variety of exceptions. If something happens,
|
|
# just return an empty dictionary (an empty session).
|
|
except:
|
|
return {}
|