debian-mirror-gitlab/config/initializers/session_store.rb

34 lines
1.3 KiB
Ruby
Raw Normal View History

2021-03-11 19:13:27 +05:30
# frozen_string_literal: true
2014-09-02 18:07:02 +05:30
# Be sure to restart your server when you modify this file.
2015-09-11 14:41:01 +05:30
require 'gitlab/current_settings'
2015-09-25 12:07:36 +05:30
2015-11-26 14:37:03 +05:30
# allow it to fail: it may do so when create_from_defaults is executed before migrations are actually done
2015-09-25 12:07:36 +05:30
begin
2018-03-17 18:26:18 +05:30
Settings.gitlab['session_expire_delay'] = Gitlab::CurrentSettings.current_application_settings.session_expire_delay || 10080
2021-06-08 01:23:25 +05:30
rescue StandardError
2015-11-26 14:37:03 +05:30
Settings.gitlab['session_expire_delay'] ||= 10080
2015-09-25 12:07:36 +05:30
end
2015-09-11 14:41:01 +05:30
2017-09-10 17:25:29 +05:30
cookie_key = if Rails.env.development?
"_gitlab_session_#{Digest::SHA256.hexdigest(Rails.root.to_s)}"
2021-11-11 11:23:49 +05:30
elsif ::Gitlab.ee? && ::Gitlab::Geo.connected? && ::Gitlab::Geo.secondary?
"_gitlab_session_geo_#{Digest::SHA256.hexdigest(GeoNode.current_node_name)}"
2017-09-10 17:25:29 +05:30
else
"_gitlab_session"
end
2018-10-15 14:42:47 +05:30
sessions_config = Gitlab::Redis::SharedState.params
sessions_config[:namespace] = Gitlab::Redis::SharedState::SESSION_NAMESPACE
2016-09-13 17:45:13 +05:30
2018-10-15 14:42:47 +05:30
Gitlab::Application.config.session_store(
:redis_store, # Using the cookie_store would enable session replay attacks.
servers: sessions_config,
key: cookie_key,
secure: Gitlab.config.gitlab.https,
httponly: true,
expires_in: Settings.gitlab['session_expire_delay'] * 60,
2021-10-27 15:23:28 +05:30
path: Rails.application.config.relative_url_root.presence || '/'
2018-10-15 14:42:47 +05:30
)