1 |
85ad3d82
|
Assos Assos
|
<?php
|
2 |
|
|
|
3 |
|
|
/**
|
4 |
|
|
* @file
|
5 |
|
|
* User session handling functions.
|
6 |
|
|
*
|
7 |
|
|
* The user-level session storage handlers:
|
8 |
|
|
* - _drupal_session_open()
|
9 |
|
|
* - _drupal_session_close()
|
10 |
|
|
* - _drupal_session_read()
|
11 |
|
|
* - _drupal_session_write()
|
12 |
|
|
* - _drupal_session_destroy()
|
13 |
|
|
* - _drupal_session_garbage_collection()
|
14 |
|
|
* are assigned by session_set_save_handler() in bootstrap.inc and are called
|
15 |
|
|
* automatically by PHP. These functions should not be called directly. Session
|
16 |
|
|
* data should instead be accessed via the $_SESSION superglobal.
|
17 |
|
|
*/
|
18 |
|
|
|
19 |
|
|
/**
|
20 |
|
|
* Session handler assigned by session_set_save_handler().
|
21 |
|
|
*
|
22 |
|
|
* This function is used to handle any initialization, such as file paths or
|
23 |
|
|
* database connections, that is needed before accessing session data. Drupal
|
24 |
|
|
* does not need to initialize anything in this function.
|
25 |
|
|
*
|
26 |
|
|
* This function should not be called directly.
|
27 |
|
|
*
|
28 |
|
|
* @return
|
29 |
|
|
* This function will always return TRUE.
|
30 |
|
|
*/
|
31 |
|
|
function _drupal_session_open() {
|
32 |
|
|
return TRUE;
|
33 |
|
|
}
|
34 |
|
|
|
35 |
|
|
/**
|
36 |
|
|
* Session handler assigned by session_set_save_handler().
|
37 |
|
|
*
|
38 |
|
|
* This function is used to close the current session. Because Drupal stores
|
39 |
|
|
* session data in the database immediately on write, this function does
|
40 |
|
|
* not need to do anything.
|
41 |
|
|
*
|
42 |
|
|
* This function should not be called directly.
|
43 |
|
|
*
|
44 |
|
|
* @return
|
45 |
|
|
* This function will always return TRUE.
|
46 |
|
|
*/
|
47 |
|
|
function _drupal_session_close() {
|
48 |
|
|
return TRUE;
|
49 |
|
|
}
|
50 |
|
|
|
51 |
|
|
/**
|
52 |
|
|
* Reads an entire session from the database (internal use only).
|
53 |
|
|
*
|
54 |
|
|
* Also initializes the $user object for the user associated with the session.
|
55 |
|
|
* This function is registered with session_set_save_handler() to support
|
56 |
|
|
* database-backed sessions. It is called on every page load when PHP sets
|
57 |
|
|
* up the $_SESSION superglobal.
|
58 |
|
|
*
|
59 |
|
|
* This function is an internal function and must not be called directly.
|
60 |
|
|
* Doing so may result in logging out the current user, corrupting session data
|
61 |
|
|
* or other unexpected behavior. Session data must always be accessed via the
|
62 |
|
|
* $_SESSION superglobal.
|
63 |
|
|
*
|
64 |
|
|
* @param $sid
|
65 |
|
|
* The session ID of the session to retrieve.
|
66 |
|
|
*
|
67 |
|
|
* @return
|
68 |
|
|
* The user's session, or an empty string if no session exists.
|
69 |
|
|
*/
|
70 |
|
|
function _drupal_session_read($sid) {
|
71 |
|
|
global $user, $is_https;
|
72 |
|
|
|
73 |
|
|
// Write and Close handlers are called after destructing objects
|
74 |
|
|
// since PHP 5.0.5.
|
75 |
|
|
// Thus destructors can use sessions but session handler can't use objects.
|
76 |
|
|
// So we are moving session closure before destructing objects.
|
77 |
|
|
drupal_register_shutdown_function('session_write_close');
|
78 |
|
|
|
79 |
|
|
// Handle the case of first time visitors and clients that don't store
|
80 |
|
|
// cookies (eg. web crawlers).
|
81 |
|
|
$insecure_session_name = substr(session_name(), 1);
|
82 |
97383e36
|
Assos Assos
|
if (empty($sid) || (!isset($_COOKIE[session_name()]) && !isset($_COOKIE[$insecure_session_name]))) {
|
83 |
85ad3d82
|
Assos Assos
|
$user = drupal_anonymous_user();
|
84 |
|
|
return '';
|
85 |
|
|
}
|
86 |
|
|
|
87 |
|
|
// Otherwise, if the session is still active, we have a record of the
|
88 |
|
|
// client's session in the database. If it's HTTPS then we are either have
|
89 |
|
|
// a HTTPS session or we are about to log in so we check the sessions table
|
90 |
|
|
// for an anonymous session with the non-HTTPS-only cookie.
|
91 |
|
|
if ($is_https) {
|
92 |
|
|
$user = db_query("SELECT u.*, s.* FROM {users} u INNER JOIN {sessions} s ON u.uid = s.uid WHERE s.ssid = :ssid", array(':ssid' => $sid))->fetchObject();
|
93 |
|
|
if (!$user) {
|
94 |
|
|
if (isset($_COOKIE[$insecure_session_name])) {
|
95 |
|
|
$user = db_query("SELECT u.*, s.* FROM {users} u INNER JOIN {sessions} s ON u.uid = s.uid WHERE s.sid = :sid AND s.uid = 0", array(
|
96 |
|
|
':sid' => $_COOKIE[$insecure_session_name]))
|
97 |
|
|
->fetchObject();
|
98 |
|
|
}
|
99 |
|
|
}
|
100 |
|
|
}
|
101 |
|
|
else {
|
102 |
|
|
$user = db_query("SELECT u.*, s.* FROM {users} u INNER JOIN {sessions} s ON u.uid = s.uid WHERE s.sid = :sid", array(':sid' => $sid))->fetchObject();
|
103 |
|
|
}
|
104 |
|
|
|
105 |
|
|
// We found the client's session record and they are an authenticated,
|
106 |
|
|
// active user.
|
107 |
|
|
if ($user && $user->uid > 0 && $user->status == 1) {
|
108 |
|
|
// This is done to unserialize the data member of $user.
|
109 |
|
|
$user->data = unserialize($user->data);
|
110 |
|
|
|
111 |
|
|
// Add roles element to $user.
|
112 |
|
|
$user->roles = array();
|
113 |
|
|
$user->roles[DRUPAL_AUTHENTICATED_RID] = 'authenticated user';
|
114 |
|
|
$user->roles += db_query("SELECT r.rid, r.name FROM {role} r INNER JOIN {users_roles} ur ON ur.rid = r.rid WHERE ur.uid = :uid", array(':uid' => $user->uid))->fetchAllKeyed(0, 1);
|
115 |
|
|
}
|
116 |
|
|
elseif ($user) {
|
117 |
|
|
// The user is anonymous or blocked. Only preserve two fields from the
|
118 |
|
|
// {sessions} table.
|
119 |
|
|
$account = drupal_anonymous_user();
|
120 |
|
|
$account->session = $user->session;
|
121 |
|
|
$account->timestamp = $user->timestamp;
|
122 |
|
|
$user = $account;
|
123 |
|
|
}
|
124 |
|
|
else {
|
125 |
|
|
// The session has expired.
|
126 |
|
|
$user = drupal_anonymous_user();
|
127 |
|
|
$user->session = '';
|
128 |
|
|
}
|
129 |
|
|
|
130 |
|
|
// Store the session that was read for comparison in _drupal_session_write().
|
131 |
|
|
$last_read = &drupal_static('drupal_session_last_read');
|
132 |
|
|
$last_read = array(
|
133 |
|
|
'sid' => $sid,
|
134 |
|
|
'value' => $user->session,
|
135 |
|
|
);
|
136 |
|
|
|
137 |
|
|
return $user->session;
|
138 |
|
|
}
|
139 |
|
|
|
140 |
|
|
/**
|
141 |
|
|
* Writes an entire session to the database (internal use only).
|
142 |
|
|
*
|
143 |
|
|
* This function is registered with session_set_save_handler() to support
|
144 |
|
|
* database-backed sessions.
|
145 |
|
|
*
|
146 |
|
|
* This function is an internal function and must not be called directly.
|
147 |
|
|
* Doing so may result in corrupted session data or other unexpected behavior.
|
148 |
|
|
* Session data must always be accessed via the $_SESSION superglobal.
|
149 |
|
|
*
|
150 |
|
|
* @param $sid
|
151 |
|
|
* The session ID of the session to write to.
|
152 |
|
|
* @param $value
|
153 |
|
|
* Session data to write as a serialized string.
|
154 |
|
|
*
|
155 |
|
|
* @return
|
156 |
|
|
* Always returns TRUE.
|
157 |
|
|
*/
|
158 |
|
|
function _drupal_session_write($sid, $value) {
|
159 |
|
|
global $user, $is_https;
|
160 |
|
|
|
161 |
|
|
// The exception handler is not active at this point, so we need to do it
|
162 |
|
|
// manually.
|
163 |
|
|
try {
|
164 |
|
|
if (!drupal_save_session()) {
|
165 |
|
|
// We don't have anything to do if we are not allowed to save the session.
|
166 |
|
|
return;
|
167 |
|
|
}
|
168 |
|
|
|
169 |
|
|
// Check whether $_SESSION has been changed in this request.
|
170 |
|
|
$last_read = &drupal_static('drupal_session_last_read');
|
171 |
|
|
$is_changed = !isset($last_read) || $last_read['sid'] != $sid || $last_read['value'] !== $value;
|
172 |
|
|
|
173 |
|
|
// For performance reasons, do not update the sessions table, unless
|
174 |
|
|
// $_SESSION has changed or more than 180 has passed since the last update.
|
175 |
|
|
if ($is_changed || !isset($user->timestamp) || REQUEST_TIME - $user->timestamp > variable_get('session_write_interval', 180)) {
|
176 |
|
|
// Either ssid or sid or both will be added from $key below.
|
177 |
|
|
$fields = array(
|
178 |
|
|
'uid' => $user->uid,
|
179 |
|
|
'cache' => isset($user->cache) ? $user->cache : 0,
|
180 |
|
|
'hostname' => ip_address(),
|
181 |
|
|
'session' => $value,
|
182 |
|
|
'timestamp' => REQUEST_TIME,
|
183 |
|
|
);
|
184 |
|
|
|
185 |
|
|
// Use the session ID as 'sid' and an empty string as 'ssid' by default.
|
186 |
|
|
// _drupal_session_read() does not allow empty strings so that's a safe
|
187 |
|
|
// default.
|
188 |
|
|
$key = array('sid' => $sid, 'ssid' => '');
|
189 |
|
|
// On HTTPS connections, use the session ID as both 'sid' and 'ssid'.
|
190 |
|
|
if ($is_https) {
|
191 |
|
|
$key['ssid'] = $sid;
|
192 |
|
|
// The "secure pages" setting allows a site to simultaneously use both
|
193 |
|
|
// secure and insecure session cookies. If enabled and both cookies are
|
194 |
|
|
// presented then use both keys.
|
195 |
|
|
if (variable_get('https', FALSE)) {
|
196 |
|
|
$insecure_session_name = substr(session_name(), 1);
|
197 |
|
|
if (isset($_COOKIE[$insecure_session_name])) {
|
198 |
|
|
$key['sid'] = $_COOKIE[$insecure_session_name];
|
199 |
|
|
}
|
200 |
|
|
}
|
201 |
|
|
}
|
202 |
|
|
elseif (variable_get('https', FALSE)) {
|
203 |
|
|
unset($key['ssid']);
|
204 |
|
|
}
|
205 |
|
|
|
206 |
|
|
db_merge('sessions')
|
207 |
|
|
->key($key)
|
208 |
|
|
->fields($fields)
|
209 |
|
|
->execute();
|
210 |
|
|
}
|
211 |
|
|
|
212 |
|
|
// Likewise, do not update access time more than once per 180 seconds.
|
213 |
|
|
if ($user->uid && REQUEST_TIME - $user->access > variable_get('session_write_interval', 180)) {
|
214 |
|
|
db_update('users')
|
215 |
|
|
->fields(array(
|
216 |
|
|
'access' => REQUEST_TIME
|
217 |
|
|
))
|
218 |
|
|
->condition('uid', $user->uid)
|
219 |
|
|
->execute();
|
220 |
|
|
}
|
221 |
|
|
|
222 |
|
|
return TRUE;
|
223 |
|
|
}
|
224 |
|
|
catch (Exception $exception) {
|
225 |
|
|
require_once DRUPAL_ROOT . '/includes/errors.inc';
|
226 |
|
|
// If we are displaying errors, then do so with no possibility of a further
|
227 |
|
|
// uncaught exception being thrown.
|
228 |
|
|
if (error_displayable()) {
|
229 |
|
|
print '<h1>Uncaught exception thrown in session handler.</h1>';
|
230 |
|
|
print '<p>' . _drupal_render_exception_safe($exception) . '</p><hr />';
|
231 |
|
|
}
|
232 |
|
|
return FALSE;
|
233 |
|
|
}
|
234 |
|
|
}
|
235 |
|
|
|
236 |
|
|
/**
|
237 |
|
|
* Initializes the session handler, starting a session if needed.
|
238 |
|
|
*/
|
239 |
|
|
function drupal_session_initialize() {
|
240 |
|
|
global $user, $is_https;
|
241 |
|
|
|
242 |
|
|
session_set_save_handler('_drupal_session_open', '_drupal_session_close', '_drupal_session_read', '_drupal_session_write', '_drupal_session_destroy', '_drupal_session_garbage_collection');
|
243 |
|
|
|
244 |
|
|
// We use !empty() in the following check to ensure that blank session IDs
|
245 |
|
|
// are not valid.
|
246 |
|
|
if (!empty($_COOKIE[session_name()]) || ($is_https && variable_get('https', FALSE) && !empty($_COOKIE[substr(session_name(), 1)]))) {
|
247 |
|
|
// If a session cookie exists, initialize the session. Otherwise the
|
248 |
|
|
// session is only started on demand in drupal_session_commit(), making
|
249 |
|
|
// anonymous users not use a session cookie unless something is stored in
|
250 |
|
|
// $_SESSION. This allows HTTP proxies to cache anonymous pageviews.
|
251 |
|
|
drupal_session_start();
|
252 |
|
|
if (!empty($user->uid) || !empty($_SESSION)) {
|
253 |
|
|
drupal_page_is_cacheable(FALSE);
|
254 |
|
|
}
|
255 |
|
|
}
|
256 |
|
|
else {
|
257 |
|
|
// Set a session identifier for this request. This is necessary because
|
258 |
|
|
// we lazily start sessions at the end of this request, and some
|
259 |
|
|
// processes (like drupal_get_token()) needs to know the future
|
260 |
|
|
// session ID in advance.
|
261 |
|
|
$GLOBALS['lazy_session'] = TRUE;
|
262 |
|
|
$user = drupal_anonymous_user();
|
263 |
|
|
// Less random sessions (which are much faster to generate) are used for
|
264 |
|
|
// anonymous users than are generated in drupal_session_regenerate() when
|
265 |
|
|
// a user becomes authenticated.
|
266 |
|
|
session_id(drupal_random_key());
|
267 |
|
|
if ($is_https && variable_get('https', FALSE)) {
|
268 |
|
|
$insecure_session_name = substr(session_name(), 1);
|
269 |
|
|
$session_id = drupal_random_key();
|
270 |
|
|
$_COOKIE[$insecure_session_name] = $session_id;
|
271 |
|
|
}
|
272 |
|
|
}
|
273 |
|
|
date_default_timezone_set(drupal_get_user_timezone());
|
274 |
|
|
}
|
275 |
|
|
|
276 |
|
|
/**
|
277 |
|
|
* Starts a session forcefully, preserving already set session data.
|
278 |
|
|
*
|
279 |
|
|
* @ingroup php_wrappers
|
280 |
|
|
*/
|
281 |
|
|
function drupal_session_start() {
|
282 |
|
|
// Command line clients do not support cookies nor sessions.
|
283 |
|
|
if (!drupal_session_started() && !drupal_is_cli()) {
|
284 |
|
|
// Save current session data before starting it, as PHP will destroy it.
|
285 |
|
|
$session_data = isset($_SESSION) ? $_SESSION : NULL;
|
286 |
|
|
|
287 |
|
|
session_start();
|
288 |
|
|
drupal_session_started(TRUE);
|
289 |
|
|
|
290 |
|
|
// Restore session data.
|
291 |
|
|
if (!empty($session_data)) {
|
292 |
|
|
$_SESSION += $session_data;
|
293 |
|
|
}
|
294 |
|
|
}
|
295 |
|
|
}
|
296 |
|
|
|
297 |
|
|
/**
|
298 |
|
|
* Commits the current session, if necessary.
|
299 |
|
|
*
|
300 |
|
|
* If an anonymous user already have an empty session, destroy it.
|
301 |
|
|
*/
|
302 |
|
|
function drupal_session_commit() {
|
303 |
|
|
global $user, $is_https;
|
304 |
|
|
|
305 |
|
|
if (!drupal_save_session()) {
|
306 |
|
|
// We don't have anything to do if we are not allowed to save the session.
|
307 |
|
|
return;
|
308 |
|
|
}
|
309 |
|
|
|
310 |
|
|
if (empty($user->uid) && empty($_SESSION)) {
|
311 |
|
|
// There is no session data to store, destroy the session if it was
|
312 |
|
|
// previously started.
|
313 |
|
|
if (drupal_session_started()) {
|
314 |
|
|
session_destroy();
|
315 |
|
|
}
|
316 |
|
|
}
|
317 |
|
|
else {
|
318 |
|
|
// There is session data to store. Start the session if it is not already
|
319 |
|
|
// started.
|
320 |
|
|
if (!drupal_session_started()) {
|
321 |
|
|
drupal_session_start();
|
322 |
|
|
if ($is_https && variable_get('https', FALSE)) {
|
323 |
|
|
$insecure_session_name = substr(session_name(), 1);
|
324 |
|
|
$params = session_get_cookie_params();
|
325 |
|
|
$expire = $params['lifetime'] ? REQUEST_TIME + $params['lifetime'] : 0;
|
326 |
|
|
setcookie($insecure_session_name, $_COOKIE[$insecure_session_name], $expire, $params['path'], $params['domain'], FALSE, $params['httponly']);
|
327 |
|
|
}
|
328 |
|
|
}
|
329 |
|
|
// Write the session data.
|
330 |
|
|
session_write_close();
|
331 |
|
|
}
|
332 |
|
|
}
|
333 |
|
|
|
334 |
|
|
/**
|
335 |
|
|
* Returns whether a session has been started.
|
336 |
|
|
*/
|
337 |
|
|
function drupal_session_started($set = NULL) {
|
338 |
|
|
static $session_started = FALSE;
|
339 |
|
|
if (isset($set)) {
|
340 |
|
|
$session_started = $set;
|
341 |
|
|
}
|
342 |
|
|
return $session_started && session_id();
|
343 |
|
|
}
|
344 |
|
|
|
345 |
|
|
/**
|
346 |
|
|
* Called when an anonymous user becomes authenticated or vice-versa.
|
347 |
|
|
*
|
348 |
|
|
* @ingroup php_wrappers
|
349 |
|
|
*/
|
350 |
|
|
function drupal_session_regenerate() {
|
351 |
|
|
global $user, $is_https;
|
352 |
|
|
// Nothing to do if we are not allowed to change the session.
|
353 |
|
|
if (!drupal_save_session()) {
|
354 |
|
|
return;
|
355 |
|
|
}
|
356 |
|
|
|
357 |
|
|
if ($is_https && variable_get('https', FALSE)) {
|
358 |
|
|
$insecure_session_name = substr(session_name(), 1);
|
359 |
|
|
if (!isset($GLOBALS['lazy_session']) && isset($_COOKIE[$insecure_session_name])) {
|
360 |
|
|
$old_insecure_session_id = $_COOKIE[$insecure_session_name];
|
361 |
|
|
}
|
362 |
|
|
$params = session_get_cookie_params();
|
363 |
|
|
$session_id = drupal_random_key();
|
364 |
|
|
// If a session cookie lifetime is set, the session will expire
|
365 |
|
|
// $params['lifetime'] seconds from the current request. If it is not set,
|
366 |
|
|
// it will expire when the browser is closed.
|
367 |
|
|
$expire = $params['lifetime'] ? REQUEST_TIME + $params['lifetime'] : 0;
|
368 |
|
|
setcookie($insecure_session_name, $session_id, $expire, $params['path'], $params['domain'], FALSE, $params['httponly']);
|
369 |
|
|
$_COOKIE[$insecure_session_name] = $session_id;
|
370 |
|
|
}
|
371 |
|
|
|
372 |
|
|
if (drupal_session_started()) {
|
373 |
|
|
$old_session_id = session_id();
|
374 |
|
|
}
|
375 |
|
|
session_id(drupal_random_key());
|
376 |
|
|
|
377 |
|
|
if (isset($old_session_id)) {
|
378 |
|
|
$params = session_get_cookie_params();
|
379 |
|
|
$expire = $params['lifetime'] ? REQUEST_TIME + $params['lifetime'] : 0;
|
380 |
|
|
setcookie(session_name(), session_id(), $expire, $params['path'], $params['domain'], $params['secure'], $params['httponly']);
|
381 |
|
|
$fields = array('sid' => session_id());
|
382 |
|
|
if ($is_https) {
|
383 |
|
|
$fields['ssid'] = session_id();
|
384 |
|
|
// If the "secure pages" setting is enabled, use the newly-created
|
385 |
|
|
// insecure session identifier as the regenerated sid.
|
386 |
|
|
if (variable_get('https', FALSE)) {
|
387 |
|
|
$fields['sid'] = $session_id;
|
388 |
|
|
}
|
389 |
|
|
}
|
390 |
|
|
db_update('sessions')
|
391 |
|
|
->fields($fields)
|
392 |
|
|
->condition($is_https ? 'ssid' : 'sid', $old_session_id)
|
393 |
|
|
->execute();
|
394 |
|
|
}
|
395 |
|
|
elseif (isset($old_insecure_session_id)) {
|
396 |
|
|
// If logging in to the secure site, and there was no active session on the
|
397 |
|
|
// secure site but a session was active on the insecure site, update the
|
398 |
|
|
// insecure session with the new session identifiers.
|
399 |
|
|
db_update('sessions')
|
400 |
|
|
->fields(array('sid' => $session_id, 'ssid' => session_id()))
|
401 |
|
|
->condition('sid', $old_insecure_session_id)
|
402 |
|
|
->execute();
|
403 |
|
|
}
|
404 |
|
|
else {
|
405 |
|
|
// Start the session when it doesn't exist yet.
|
406 |
|
|
// Preserve the logged in user, as it will be reset to anonymous
|
407 |
|
|
// by _drupal_session_read.
|
408 |
|
|
$account = $user;
|
409 |
|
|
drupal_session_start();
|
410 |
|
|
$user = $account;
|
411 |
|
|
}
|
412 |
|
|
date_default_timezone_set(drupal_get_user_timezone());
|
413 |
|
|
}
|
414 |
|
|
|
415 |
|
|
/**
|
416 |
|
|
* Session handler assigned by session_set_save_handler().
|
417 |
|
|
*
|
418 |
|
|
* Cleans up a specific session.
|
419 |
|
|
*
|
420 |
|
|
* @param $sid
|
421 |
|
|
* Session ID.
|
422 |
|
|
*/
|
423 |
|
|
function _drupal_session_destroy($sid) {
|
424 |
|
|
global $user, $is_https;
|
425 |
|
|
|
426 |
|
|
// Nothing to do if we are not allowed to change the session.
|
427 |
|
|
if (!drupal_save_session()) {
|
428 |
|
|
return;
|
429 |
|
|
}
|
430 |
|
|
|
431 |
|
|
// Delete session data.
|
432 |
|
|
db_delete('sessions')
|
433 |
|
|
->condition($is_https ? 'ssid' : 'sid', $sid)
|
434 |
|
|
->execute();
|
435 |
|
|
|
436 |
|
|
// Reset $_SESSION and $user to prevent a new session from being started
|
437 |
|
|
// in drupal_session_commit().
|
438 |
|
|
$_SESSION = array();
|
439 |
|
|
$user = drupal_anonymous_user();
|
440 |
|
|
|
441 |
|
|
// Unset the session cookies.
|
442 |
|
|
_drupal_session_delete_cookie(session_name());
|
443 |
|
|
if ($is_https) {
|
444 |
|
|
_drupal_session_delete_cookie(substr(session_name(), 1), FALSE);
|
445 |
|
|
}
|
446 |
|
|
elseif (variable_get('https', FALSE)) {
|
447 |
|
|
_drupal_session_delete_cookie('S' . session_name(), TRUE);
|
448 |
|
|
}
|
449 |
|
|
}
|
450 |
|
|
|
451 |
|
|
/**
|
452 |
|
|
* Deletes the session cookie.
|
453 |
|
|
*
|
454 |
|
|
* @param $name
|
455 |
|
|
* Name of session cookie to delete.
|
456 |
|
|
* @param boolean $secure
|
457 |
|
|
* Force the secure value of the cookie.
|
458 |
|
|
*/
|
459 |
|
|
function _drupal_session_delete_cookie($name, $secure = NULL) {
|
460 |
|
|
global $is_https;
|
461 |
|
|
if (isset($_COOKIE[$name]) || (!$is_https && $secure === TRUE)) {
|
462 |
|
|
$params = session_get_cookie_params();
|
463 |
|
|
if ($secure !== NULL) {
|
464 |
|
|
$params['secure'] = $secure;
|
465 |
|
|
}
|
466 |
|
|
setcookie($name, '', REQUEST_TIME - 3600, $params['path'], $params['domain'], $params['secure'], $params['httponly']);
|
467 |
|
|
unset($_COOKIE[$name]);
|
468 |
|
|
}
|
469 |
|
|
}
|
470 |
|
|
|
471 |
|
|
/**
|
472 |
|
|
* Ends a specific user's session(s).
|
473 |
|
|
*
|
474 |
|
|
* @param $uid
|
475 |
|
|
* User ID.
|
476 |
|
|
*/
|
477 |
|
|
function drupal_session_destroy_uid($uid) {
|
478 |
|
|
// Nothing to do if we are not allowed to change the session.
|
479 |
|
|
if (!drupal_save_session()) {
|
480 |
|
|
return;
|
481 |
|
|
}
|
482 |
|
|
|
483 |
|
|
db_delete('sessions')
|
484 |
|
|
->condition('uid', $uid)
|
485 |
|
|
->execute();
|
486 |
|
|
}
|
487 |
|
|
|
488 |
|
|
/**
|
489 |
|
|
* Session handler assigned by session_set_save_handler().
|
490 |
|
|
*
|
491 |
|
|
* Cleans up stalled sessions.
|
492 |
|
|
*
|
493 |
|
|
* @param $lifetime
|
494 |
|
|
* The value of session.gc_maxlifetime, passed by PHP.
|
495 |
|
|
* Sessions not updated for more than $lifetime seconds will be removed.
|
496 |
|
|
*/
|
497 |
|
|
function _drupal_session_garbage_collection($lifetime) {
|
498 |
|
|
// Be sure to adjust 'php_value session.gc_maxlifetime' to a large enough
|
499 |
|
|
// value. For example, if you want user sessions to stay in your database
|
500 |
|
|
// for three weeks before deleting them, you need to set gc_maxlifetime
|
501 |
|
|
// to '1814400'. At that value, only after a user doesn't log in after
|
502 |
|
|
// three weeks (1814400 seconds) will his/her session be removed.
|
503 |
|
|
db_delete('sessions')
|
504 |
|
|
->condition('timestamp', REQUEST_TIME - $lifetime, '<')
|
505 |
|
|
->execute();
|
506 |
|
|
return TRUE;
|
507 |
|
|
}
|
508 |
|
|
|
509 |
|
|
/**
|
510 |
|
|
* Determines whether to save session data of the current request.
|
511 |
|
|
*
|
512 |
|
|
* This function allows the caller to temporarily disable writing of
|
513 |
|
|
* session data, should the request end while performing potentially
|
514 |
|
|
* dangerous operations, such as manipulating the global $user object.
|
515 |
|
|
* See http://drupal.org/node/218104 for usage.
|
516 |
|
|
*
|
517 |
|
|
* @param $status
|
518 |
|
|
* Disables writing of session data when FALSE, (re-)enables
|
519 |
|
|
* writing when TRUE.
|
520 |
|
|
*
|
521 |
|
|
* @return
|
522 |
|
|
* FALSE if writing session data has been disabled. Otherwise, TRUE.
|
523 |
|
|
*/
|
524 |
|
|
function drupal_save_session($status = NULL) {
|
525 |
|
|
// PHP session ID, session, and cookie handling happens in the global scope.
|
526 |
|
|
// This value has to persist across calls to drupal_static_reset(), since a
|
527 |
|
|
// potentially wrong or disallowed session would be written otherwise.
|
528 |
|
|
static $save_session = TRUE;
|
529 |
|
|
if (isset($status)) {
|
530 |
|
|
$save_session = $status;
|
531 |
|
|
}
|
532 |
|
|
return $save_session;
|
533 |
|
|
} |