41 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			41 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package application
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"strconv"
 | 
						|
 | 
						|
	"github.com/gorilla/sessions"
 | 
						|
	"goauthentik.io/api"
 | 
						|
	"goauthentik.io/internal/config"
 | 
						|
	"gopkg.in/boj/redistore.v1"
 | 
						|
)
 | 
						|
 | 
						|
func (a *Application) getStore(p api.ProxyOutpostConfig) sessions.Store {
 | 
						|
	var store sessions.Store
 | 
						|
	if config.G.Redis.Host != "" {
 | 
						|
		rs, err := redistore.NewRediStoreWithDB(10, "tcp", fmt.Sprintf("%s:%d", config.G.Redis.Host, config.G.Redis.Port), config.G.Redis.Password, strconv.Itoa(config.G.Redis.OutpostSessionDB), []byte(*p.CookieSecret))
 | 
						|
		if err != nil {
 | 
						|
			panic(err)
 | 
						|
		}
 | 
						|
		if p.TokenValidity.IsSet() {
 | 
						|
			t := p.TokenValidity.Get()
 | 
						|
			// Add one to the validity to ensure we don't have a session with indefinite length
 | 
						|
			rs.Options.MaxAge = int(*t) + 1
 | 
						|
		}
 | 
						|
		rs.Options.Domain = *p.CookieDomain
 | 
						|
		a.log.Info("using redis session backend")
 | 
						|
		store = rs
 | 
						|
	} else {
 | 
						|
		cs := sessions.NewCookieStore([]byte(*p.CookieSecret))
 | 
						|
		cs.Options.Domain = *p.CookieDomain
 | 
						|
		if p.TokenValidity.IsSet() {
 | 
						|
			t := p.TokenValidity.Get()
 | 
						|
			// Add one to the validity to ensure we don't have a session with indefinite length
 | 
						|
			cs.Options.MaxAge = int(*t) + 1
 | 
						|
		}
 | 
						|
		a.log.Info("using cookie session backend")
 | 
						|
		store = cs
 | 
						|
	}
 | 
						|
	return store
 | 
						|
}
 |