blob: 7f410d7bf7bbd97b2be9e74130d799746657cbc7 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
|
# frozen_string_literal: true
# Be sure to restart your server when you modify this file.
require 'gitlab/current_settings'
# allow it to fail: it may do so when create_from_defaults is executed before migrations are actually done
begin
session_expire_delay = Gitlab::CurrentSettings.current_application_settings.session_expire_delay
Settings.gitlab['session_expire_delay'] = session_expire_delay || 10080
rescue StandardError
Settings.gitlab['session_expire_delay'] ||= 10080
end
raw_config = if File.exist?(Rails.root.join('config/session_store.yml'))
Rails.application.config_for(:session_store)
else
{}
end
cookie_key = if Rails.env.development?
cookie_key_prefix = raw_config.fetch(:cookie_key, "_gitlab_session")
# If config doesn't exist we preserve the current default behaviour, which is a unique postfix per GDK
unique_key = raw_config.fetch(:unique_cookie_key_postfix, true)
unique_key ? "#{cookie_key_prefix}_#{Digest::SHA256.hexdigest(Rails.root.to_s)}" : cookie_key_prefix
elsif ::Gitlab.ee? && ::Gitlab::Geo.connected? && ::Gitlab::Geo.secondary?
"_gitlab_session_geo_#{Digest::SHA256.hexdigest(GeoNode.current_node_name)}"
else
"_gitlab_session"
end
store = Gitlab::Redis::Sessions.store(namespace: Gitlab::Redis::Sessions::SESSION_NAMESPACE)
Rails.application.configure do
config.session_store(
:redis_store, # Using the cookie_store would enable session replay attacks.
redis_store: store,
key: cookie_key,
secure: Gitlab.config.gitlab.https,
httponly: true,
expires_in: Settings.gitlab['session_expire_delay'] * 60,
path: Rails.application.config.relative_url_root.presence || '/'
)
config.middleware.insert_after ActionDispatch::Session::RedisStore, Gitlab::Middleware::UnauthenticatedSessionExpiry
end
|