|
- // Copyright 2012 The Gorilla Authors. All rights reserved.
- // Use of this source code is governed by a BSD-style
- // license that can be found in the LICENSE file.
-
- /*
- Package sessions provides cookie and filesystem sessions and
- infrastructure for custom session backends.
-
- The key features are:
-
- * Simple API: use it as an easy way to set signed (and optionally
- encrypted) cookies.
- * Built-in backends to store sessions in cookies or the filesystem.
- * Flash messages: session values that last until read.
- * Convenient way to switch session persistency (aka "remember me") and set
- other attributes.
- * Mechanism to rotate authentication and encryption keys.
- * Multiple sessions per request, even using different backends.
- * Interfaces and infrastructure for custom session backends: sessions from
- different stores can be retrieved and batch-saved using a common API.
-
- Let's start with an example that shows the sessions API in a nutshell:
-
- import (
- "net/http"
- "github.com/gorilla/sessions"
- )
-
- // Note: Don't store your key in your source code. Pass it via an
- // environmental variable, or flag (or both), and don't accidentally commit it
- // alongside your code. Ensure your key is sufficiently random - i.e. use Go's
- // crypto/rand or securecookie.GenerateRandomKey(32) and persist the result.
- var store = sessions.NewCookieStore(os.Getenv("SESSION_KEY"))
-
- func MyHandler(w http.ResponseWriter, r *http.Request) {
- // Get a session. Get() always returns a session, even if empty.
- session, err := store.Get(r, "session-name")
- if err != nil {
- http.Error(w, err.Error(), http.StatusInternalServerError)
- return
- }
-
- // Set some session values.
- session.Values["foo"] = "bar"
- session.Values[42] = 43
- // Save it before we write to the response/return from the handler.
- session.Save(r, w)
- }
-
- First we initialize a session store calling NewCookieStore() and passing a
- secret key used to authenticate the session. Inside the handler, we call
- store.Get() to retrieve an existing session or a new one. Then we set some
- session values in session.Values, which is a map[interface{}]interface{}.
- And finally we call session.Save() to save the session in the response.
-
- Note that in production code, we should check for errors when calling
- session.Save(r, w), and either display an error message or otherwise handle it.
-
- Save must be called before writing to the response, otherwise the session
- cookie will not be sent to the client.
-
- That's all you need to know for the basic usage. Let's take a look at other
- options, starting with flash messages.
-
- Flash messages are session values that last until read. The term appeared with
- Ruby On Rails a few years back. When we request a flash message, it is removed
- from the session. To add a flash, call session.AddFlash(), and to get all
- flashes, call session.Flashes(). Here is an example:
-
- func MyHandler(w http.ResponseWriter, r *http.Request) {
- // Get a session.
- session, err := store.Get(r, "session-name")
- if err != nil {
- http.Error(w, err.Error(), http.StatusInternalServerError)
- return
- }
-
- // Get the previous flashes, if any.
- if flashes := session.Flashes(); len(flashes) > 0 {
- // Use the flash values.
- } else {
- // Set a new flash.
- session.AddFlash("Hello, flash messages world!")
- }
- session.Save(r, w)
- }
-
- Flash messages are useful to set information to be read after a redirection,
- like after form submissions.
-
- There may also be cases where you want to store a complex datatype within a
- session, such as a struct. Sessions are serialised using the encoding/gob package,
- so it is easy to register new datatypes for storage in sessions:
-
- import(
- "encoding/gob"
- "github.com/gorilla/sessions"
- )
-
- type Person struct {
- FirstName string
- LastName string
- Email string
- Age int
- }
-
- type M map[string]interface{}
-
- func init() {
-
- gob.Register(&Person{})
- gob.Register(&M{})
- }
-
- As it's not possible to pass a raw type as a parameter to a function, gob.Register()
- relies on us passing it a value of the desired type. In the example above we've passed
- it a pointer to a struct and a pointer to a custom type representing a
- map[string]interface. (We could have passed non-pointer values if we wished.) This will
- then allow us to serialise/deserialise values of those types to and from our sessions.
-
- Note that because session values are stored in a map[string]interface{}, there's
- a need to type-assert data when retrieving it. We'll use the Person struct we registered above:
-
- func MyHandler(w http.ResponseWriter, r *http.Request) {
- session, err := store.Get(r, "session-name")
- if err != nil {
- http.Error(w, err.Error(), http.StatusInternalServerError)
- return
- }
-
- // Retrieve our struct and type-assert it
- val := session.Values["person"]
- var person = &Person{}
- if person, ok := val.(*Person); !ok {
- // Handle the case that it's not an expected type
- }
-
- // Now we can use our person object
- }
-
- By default, session cookies last for a month. This is probably too long for
- some cases, but it is easy to change this and other attributes during
- runtime. Sessions can be configured individually or the store can be
- configured and then all sessions saved using it will use that configuration.
- We access session.Options or store.Options to set a new configuration. The
- fields are basically a subset of http.Cookie fields. Let's change the
- maximum age of a session to one week:
-
- session.Options = &sessions.Options{
- Path: "/",
- MaxAge: 86400 * 7,
- HttpOnly: true,
- }
-
- Sometimes we may want to change authentication and/or encryption keys without
- breaking existing sessions. The CookieStore supports key rotation, and to use
- it you just need to set multiple authentication and encryption keys, in pairs,
- to be tested in order:
-
- var store = sessions.NewCookieStore(
- []byte("new-authentication-key"),
- []byte("new-encryption-key"),
- []byte("old-authentication-key"),
- []byte("old-encryption-key"),
- )
-
- New sessions will be saved using the first pair. Old sessions can still be
- read because the first pair will fail, and the second will be tested. This
- makes it easy to "rotate" secret keys and still be able to validate existing
- sessions. Note: for all pairs the encryption key is optional; set it to nil
- or omit it and and encryption won't be used.
-
- Multiple sessions can be used in the same request, even with different
- session backends. When this happens, calling Save() on each session
- individually would be cumbersome, so we have a way to save all sessions
- at once: it's sessions.Save(). Here's an example:
-
- var store = sessions.NewCookieStore([]byte("something-very-secret"))
-
- func MyHandler(w http.ResponseWriter, r *http.Request) {
- // Get a session and set a value.
- session1, _ := store.Get(r, "session-one")
- session1.Values["foo"] = "bar"
- // Get another session and set another value.
- session2, _ := store.Get(r, "session-two")
- session2.Values[42] = 43
- // Save all sessions.
- sessions.Save(r, w)
- }
-
- This is possible because when we call Get() from a session store, it adds the
- session to a common registry. Save() uses it to save all registered sessions.
- */
- package sessions
|