Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
175 changes: 175 additions & 0 deletions mrblib/rack/session/cookie.rb
Original file line number Diff line number Diff line change
@@ -0,0 +1,175 @@
module Rack

module Session

# Rack::Session::Cookie provides simple cookie based session management.
# By default, the session is a Ruby Hash stored as Json encoded
# data set to :key (default: rack.session). The object that encodes the
# session data is configurable and must respond to +encode+ and +decode+.
# Both methods must take a string and return a string.
#
# When the secret key is set, cookie data is checked for data integrity.
# The old secret key is also accepted and allows graceful secret rotation.
#
# Example:
#
# use Rack::Session::Cookie, :key => 'rack.session',
# :domain => 'foo.com',
# :path => '/',
# :expire_after => 2592000,
# :secret => 'change_me',
# :old_secret => 'also_change_me'
#
# All parameters are optional.
#
# Example of a cookie with no encoding:
#
# Rack::Session::Cookie.new(application, {
# :coder => Rack::Session::Cookie::Identity.new
# })
#
# Example of a cookie with custom encoding:
#
# Rack::Session::Cookie.new(application, {
# :coder => Class.new {
# def encode(str); str.reverse; end
# def decode(str); str.reverse; end
# }.new
# })
#

class Cookie < Abstract::Persisted
# Encode session cookies as Base64
class Base64
def encode(str)
[str].pack('m')
end

def decode(str)
str.unpack('m').first
end

# N.B. Unlike other encoding methods, the contained objects must be a
# valid JSON composite type, either a Hash or an Array.
class JSON < Base64
def encode(obj)
super(::JSON.dump(obj))
end

def decode(str)
return unless str
::JSON.parse(super(str)) rescue nil
end
end

class ZipJSON < Base64
def encode(obj)
super(Zlib.deflate(::JSON.dump(obj)))
end

def decode(str)
return unless str
::JSON.parse(Zlib.inflate(super(str)))
rescue
nil
end
end
end

# Use no encoding for session cookies
class Identity
def encode(str); str; end
def decode(str); str; end
end

attr_reader :coder

def initialize(app, options = {})
@secrets = options.values_at(:secret, :old_secret).compact
@hmac = options.fetch(:hmac, Digest::SHA256)

warn <<-MSG unless secure?(options)
SECURITY WARNING: No secret option provided to Rack::Session::Cookie.
This poses a security threat. It is strongly recommended that you
provide a secret to prevent exploits that may be possible from crafted
cookies. This will not be supported in future versions of Rack, and
future versions will even invalidate your existing user cookies.
Called from: #{caller[0]}.
MSG
@coder = options[:coder] ||= Base64::JSON.new
super(app, options.merge!(cookie_only: true))
end

private

def find_session(req, sid)
data = unpacked_cookie_data(req)
data = persistent_session_id!(data)
[data["session_id"], data]
end

def extract_session_id(request)
unpacked_cookie_data(request)["session_id"]
end

def unpacked_cookie_data(request)
request.fetch_header(RACK_SESSION_UNPACKED_COOKIE_DATA) do |k|
session_data = request.cookies[@key]

if @secrets.size > 0 && session_data
digest, session_data = session_data.reverse.split("--", 2)
digest.reverse! if digest
session_data.reverse! if session_data
session_data = nil unless digest_match?(session_data, digest)
end

request.set_header(k, coder.decode(session_data) || {})
end
end

def persistent_session_id!(data, sid = nil)
data ||= {}
data["session_id"] ||= sid || generate_sid
data
end

def write_session(req, session_id, session, options)
session = session.merge("session_id" => session_id)
session_data = coder.encode(session)

if @secrets.first
session_data << "--#{generate_hmac(session_data, @secrets.first)}"
end

if session_data.size > (4096 - @key.size)
req.get_header(RACK_ERRORS).puts("Warning! Rack::Session::Cookie data size exceeds 4K.")
nil
else
session_data
end
end

def delete_session(req, session_id, options)
# Nothing to do here, data is in the client
generate_sid unless options[:drop]
end

def digest_match?(data, digest)
return unless data && digest
@secrets.any? do |secret|
Rack::Utils.secure_compare(digest, generate_hmac(data, secret))
end
end

def generate_hmac(data, secret)
Digest::HMAC.hexdigest(data, secret, @hmac)
end

def secure?(options)
@secrets.size >= 1 ||
(options[:coder] && options[:let_coder_handle_secure_encoding])
end

end
end
end