2006-08-19 09:04:45 +02:00
|
|
|
<?php
|
2021-02-16 15:13:16 +01:00
|
|
|
namespace Sessions;
|
|
|
|
|
2021-11-11 16:57:03 +01:00
|
|
|
use UserHelper;
|
2021-11-10 18:44:51 +01:00
|
|
|
|
2021-11-11 16:57:03 +01:00
|
|
|
require_once "autoload.php";
|
2013-04-16 17:41:31 +02:00
|
|
|
require_once "errorhandler.php";
|
2020-09-17 17:56:29 +02:00
|
|
|
require_once "lib/gettext/gettext.inc.php";
|
2006-03-02 09:10:43 +01:00
|
|
|
|
2021-02-22 19:47:48 +01:00
|
|
|
$session_expire = min(2147483647 - time() - 1, max(\Config::get(\Config::SESSION_COOKIE_LIFETIME), 86400));
|
2021-02-23 15:01:25 +01:00
|
|
|
$session_name = \Config::get(\Config::SESSION_NAME);
|
2006-03-02 09:10:43 +01:00
|
|
|
|
2021-03-01 08:20:21 +01:00
|
|
|
if (\Config::is_server_https()) {
|
2021-02-22 12:41:09 +01:00
|
|
|
ini_set("session.cookie_secure", "true");
|
2011-03-28 06:30:00 +02:00
|
|
|
}
|
|
|
|
|
2021-02-22 12:41:09 +01:00
|
|
|
ini_set("session.gc_probability", "75");
|
2006-05-23 07:07:38 +02:00
|
|
|
ini_set("session.name", $session_name);
|
2021-02-22 12:41:09 +01:00
|
|
|
ini_set("session.use_only_cookies", "true");
|
2013-03-28 07:06:16 +01:00
|
|
|
ini_set("session.gc_maxlifetime", $session_expire);
|
2021-02-22 12:41:09 +01:00
|
|
|
ini_set("session.cookie_lifetime", "0");
|
2006-03-02 09:10:43 +01:00
|
|
|
|
2021-06-25 11:12:05 +02:00
|
|
|
// prolong PHP session cookie
|
|
|
|
if (isset($_COOKIE[$session_name]))
|
|
|
|
setcookie($session_name,
|
|
|
|
$_COOKIE[$session_name],
|
|
|
|
time() + $session_expire,
|
|
|
|
ini_get("session.cookie_path"),
|
|
|
|
ini_get("session.cookie_domain"),
|
|
|
|
ini_get("session.cookie_secure"),
|
|
|
|
ini_get("session.cookie_httponly"));
|
|
|
|
|
2021-11-11 16:57:03 +01:00
|
|
|
function validate_session(): bool {
|
2021-02-22 19:47:48 +01:00
|
|
|
if (\Config::get(\Config::SINGLE_USER_MODE)) return true;
|
2013-03-31 11:10:46 +02:00
|
|
|
|
2021-03-04 06:32:19 +01:00
|
|
|
$pdo = \Db::pdo();
|
2013-03-31 11:10:46 +02:00
|
|
|
|
2021-02-05 22:12:15 +01:00
|
|
|
if (!empty($_SESSION["uid"])) {
|
2021-03-01 17:32:27 +01:00
|
|
|
$user = \ORM::for_table('ttrss_users')->find_one($_SESSION["uid"]);
|
2013-03-31 11:10:46 +02:00
|
|
|
|
2021-03-01 17:32:27 +01:00
|
|
|
if ($user) {
|
|
|
|
if ($user->pwd_hash != $_SESSION["pwd_hash"]) {
|
2021-03-05 10:27:23 +01:00
|
|
|
$_SESSION["login_error_msg"] = __("Session failed to validate (password changed)");
|
2021-03-01 17:32:27 +01:00
|
|
|
return false;
|
|
|
|
}
|
2021-11-10 18:44:51 +01:00
|
|
|
|
|
|
|
if ($user->access_level == UserHelper::ACCESS_LEVEL_DISABLED) {
|
|
|
|
$_SESSION["login_error_msg"] = __("Session failed to validate (account is disabled)");
|
|
|
|
return false;
|
|
|
|
}
|
2024-02-21 20:13:23 +01:00
|
|
|
|
|
|
|
// default to true because there might not be any hooks and this is our last check
|
|
|
|
$hook_result = true;
|
|
|
|
|
|
|
|
\PluginHost::getInstance()->chain_hooks_callback(\PluginHost::HOOK_VALIDATE_SESSION,
|
|
|
|
function ($result) use (&$hook_result) {
|
|
|
|
$hook_result = $result;
|
|
|
|
|
|
|
|
if (!$result) {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
});
|
|
|
|
|
|
|
|
return $hook_result;
|
|
|
|
|
2013-03-31 11:10:46 +02:00
|
|
|
} else {
|
2021-03-05 10:27:23 +01:00
|
|
|
$_SESSION["login_error_msg"] = __("Session failed to validate (user not found)");
|
2021-03-01 17:32:27 +01:00
|
|
|
return false;
|
2013-03-31 11:10:46 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-11-11 16:57:03 +01:00
|
|
|
function ttrss_open(string $savePath, string $sessionName): bool {
|
2006-03-02 09:10:43 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-11-11 16:57:03 +01:00
|
|
|
function ttrss_read(string $id): string {
|
2013-04-17 13:36:34 +02:00
|
|
|
global $session_expire;
|
|
|
|
|
2021-02-16 15:13:16 +01:00
|
|
|
$sth = \Db::pdo()->prepare("SELECT data FROM ttrss_sessions WHERE id=?");
|
2017-12-01 12:48:23 +01:00
|
|
|
$sth->execute([$id]);
|
2011-03-28 06:30:00 +02:00
|
|
|
|
2017-12-01 12:48:23 +01:00
|
|
|
if ($row = $sth->fetch()) {
|
2018-10-16 13:07:42 +02:00
|
|
|
return base64_decode($row["data"]);
|
2006-03-02 09:10:43 +01:00
|
|
|
|
2017-12-01 12:48:23 +01:00
|
|
|
} else {
|
2018-10-16 13:07:42 +02:00
|
|
|
$expire = time() + $session_expire;
|
2006-03-02 09:10:43 +01:00
|
|
|
|
2021-02-16 15:13:16 +01:00
|
|
|
$sth = \Db::pdo()->prepare("INSERT INTO ttrss_sessions (id, data, expire)
|
2017-12-01 12:48:23 +01:00
|
|
|
VALUES (?, '', ?)");
|
2018-10-16 13:07:42 +02:00
|
|
|
$sth->execute([$id, $expire]);
|
2017-12-01 12:48:23 +01:00
|
|
|
|
2018-10-16 13:07:42 +02:00
|
|
|
return "";
|
2011-03-28 06:30:00 +02:00
|
|
|
|
2006-03-02 09:10:43 +01:00
|
|
|
}
|
2013-04-17 13:36:34 +02:00
|
|
|
|
2006-03-02 09:10:43 +01:00
|
|
|
}
|
|
|
|
|
2021-11-11 16:57:03 +01:00
|
|
|
function ttrss_write(string $id, string $data): bool {
|
2013-04-17 13:36:34 +02:00
|
|
|
global $session_expire;
|
2011-03-28 06:30:00 +02:00
|
|
|
|
2013-04-17 13:36:34 +02:00
|
|
|
$data = base64_encode($data);
|
2006-03-02 09:10:43 +01:00
|
|
|
$expire = time() + $session_expire;
|
2011-03-28 06:30:00 +02:00
|
|
|
|
2021-02-16 15:13:16 +01:00
|
|
|
$sth = \Db::pdo()->prepare("SELECT id FROM ttrss_sessions WHERE id=?");
|
2018-10-16 13:07:42 +02:00
|
|
|
$sth->execute([$id]);
|
|
|
|
|
2024-01-08 23:46:13 +01:00
|
|
|
if ($sth->fetch()) {
|
2021-02-16 15:13:16 +01:00
|
|
|
$sth = \Db::pdo()->prepare("UPDATE ttrss_sessions SET data=?, expire=? WHERE id=?");
|
2018-10-16 13:07:42 +02:00
|
|
|
$sth->execute([$data, $expire, $id]);
|
|
|
|
} else {
|
2021-02-16 15:13:16 +01:00
|
|
|
$sth = \Db::pdo()->prepare("INSERT INTO ttrss_sessions (id, data, expire)
|
2018-10-16 13:07:42 +02:00
|
|
|
VALUES (?, ?, ?)");
|
|
|
|
$sth->execute([$id, $data, $expire]);
|
|
|
|
}
|
2011-03-28 06:30:00 +02:00
|
|
|
|
2006-03-02 09:10:43 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-11-11 16:57:03 +01:00
|
|
|
function ttrss_close(): bool {
|
2006-03-02 09:10:43 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-11-11 16:57:03 +01:00
|
|
|
function ttrss_destroy(string $id): bool {
|
2021-02-16 15:13:16 +01:00
|
|
|
$sth = \Db::pdo()->prepare("DELETE FROM ttrss_sessions WHERE id = ?");
|
2017-12-01 12:48:23 +01:00
|
|
|
$sth->execute([$id]);
|
2011-03-28 06:30:00 +02:00
|
|
|
|
2006-03-02 09:10:43 +01:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2021-11-11 16:57:03 +01:00
|
|
|
function ttrss_gc(int $lifetime): bool {
|
2021-02-16 15:13:16 +01:00
|
|
|
\Db::pdo()->query("DELETE FROM ttrss_sessions WHERE expire < " . time());
|
2015-12-07 13:25:31 +01:00
|
|
|
|
|
|
|
return true;
|
2006-03-02 09:10:43 +01:00
|
|
|
}
|
|
|
|
|
2021-03-04 07:22:24 +01:00
|
|
|
if (\Config::get_schema_version() >= 0) {
|
2021-05-11 18:21:53 +02:00
|
|
|
session_set_save_handler('\Sessions\ttrss_open',
|
|
|
|
'\Sessions\ttrss_close', '\Sessions\ttrss_read',
|
|
|
|
'\Sessions\ttrss_write', '\Sessions\ttrss_destroy',
|
2021-11-11 16:57:03 +01:00
|
|
|
'\Sessions\ttrss_gc'); // @phpstan-ignore-line
|
|
|
|
// PHPStan complains about '\Sessions\ttrss_gc' if its $lifetime param isn't marked as string,
|
|
|
|
// but the docs say it's an int. If it is actually a string it'll get coerced to an int.
|
|
|
|
|
2021-05-11 18:21:53 +02:00
|
|
|
register_shutdown_function('session_write_close');
|
2007-03-01 13:09:05 +01:00
|
|
|
|
2021-03-04 07:22:24 +01:00
|
|
|
if (!defined('NO_SESSION_AUTOSTART')) {
|
|
|
|
if (isset($_COOKIE[session_name()])) {
|
|
|
|
if (session_status() != PHP_SESSION_ACTIVE)
|
|
|
|
session_start();
|
|
|
|
}
|
2013-03-28 05:06:21 +01:00
|
|
|
}
|
2012-09-19 10:45:01 +02:00
|
|
|
}
|