2014-09-02 18:07:02 +05:30
|
|
|
# Be sure to restart your server when you modify this file.
|
|
|
|
|
2015-09-11 14:41:01 +05:30
|
|
|
require 'gitlab/current_settings'
|
|
|
|
include Gitlab::CurrentSettings
|
2015-09-25 12:07:36 +05:30
|
|
|
|
2015-11-26 14:37:03 +05:30
|
|
|
# allow it to fail: it may do so when create_from_defaults is executed before migrations are actually done
|
2015-09-25 12:07:36 +05:30
|
|
|
begin
|
2015-11-26 14:37:03 +05:30
|
|
|
Settings.gitlab['session_expire_delay'] = current_application_settings.session_expire_delay || 10080
|
2015-09-25 12:07:36 +05:30
|
|
|
rescue
|
2015-11-26 14:37:03 +05:30
|
|
|
Settings.gitlab['session_expire_delay'] ||= 10080
|
2015-09-25 12:07:36 +05:30
|
|
|
end
|
2015-09-11 14:41:01 +05:30
|
|
|
|
2015-12-23 02:04:40 +05:30
|
|
|
if Rails.env.test?
|
|
|
|
Gitlab::Application.config.session_store :cookie_store, key: "_gitlab_session"
|
|
|
|
else
|
2016-09-13 17:45:13 +05:30
|
|
|
redis_config = Gitlab::Redis.params
|
2016-06-02 11:05:42 +05:30
|
|
|
redis_config[:namespace] = Gitlab::Redis::SESSION_NAMESPACE
|
2016-09-13 17:45:13 +05:30
|
|
|
|
2015-11-26 14:37:03 +05:30
|
|
|
Gitlab::Application.config.session_store(
|
|
|
|
:redis_store, # Using the cookie_store would enable session replay attacks.
|
2016-06-02 11:05:42 +05:30
|
|
|
servers: redis_config,
|
2015-11-26 14:37:03 +05:30
|
|
|
key: '_gitlab_session',
|
|
|
|
secure: Gitlab.config.gitlab.https,
|
|
|
|
httponly: true,
|
2016-06-02 11:05:42 +05:30
|
|
|
expires_in: Settings.gitlab['session_expire_delay'] * 60,
|
2016-06-16 23:09:34 +05:30
|
|
|
path: Rails.application.config.relative_url_root.nil? ? '/' : Gitlab::Application.config.relative_url_root
|
2015-11-26 14:37:03 +05:30
|
|
|
)
|
|
|
|
end
|