feat: implement server-side session management with session ID storage and cleanup
All checks were successful
Build And Push Image / docker (push) Successful in 2m51s
All checks were successful
Build And Push Image / docker (push) Successful in 2m51s
This commit is contained in:
@@ -1,85 +1,125 @@
|
||||
import { serialize, parse } from 'cookie';
|
||||
import { createCipheriv, createDecipheriv, randomBytes } from 'crypto';
|
||||
import { randomBytes } from 'crypto';
|
||||
import type { SessionData } from '~/utils/types';
|
||||
|
||||
// In-memory session store (in production, you'd use Redis or a database)
|
||||
const sessionStore = new Map<string, {
|
||||
data: SessionData;
|
||||
expiresAt: number;
|
||||
rememberMe: boolean;
|
||||
}>();
|
||||
|
||||
// Cleanup expired sessions every 5 minutes
|
||||
setInterval(() => {
|
||||
const now = Date.now();
|
||||
for (const [sessionId, session] of sessionStore.entries()) {
|
||||
if (now > session.expiresAt) {
|
||||
sessionStore.delete(sessionId);
|
||||
console.log('🧹 Cleaned up expired session:', sessionId.substring(0, 8) + '...');
|
||||
}
|
||||
}
|
||||
}, 5 * 60 * 1000);
|
||||
|
||||
export class SessionManager {
|
||||
private encryptionKey: Buffer;
|
||||
private cookieName = 'monacousa-session';
|
||||
|
||||
constructor(encryptionKey: string) {
|
||||
this.encryptionKey = Buffer.from(encryptionKey, 'hex');
|
||||
constructor() {
|
||||
// No encryption key needed since we're only storing session IDs
|
||||
}
|
||||
|
||||
encrypt(data: string): string {
|
||||
const iv = randomBytes(16);
|
||||
const cipher = createCipheriv('aes-256-cbc', this.encryptionKey, iv);
|
||||
let encrypted = cipher.update(data, 'utf8', 'hex');
|
||||
encrypted += cipher.final('hex');
|
||||
return iv.toString('hex') + ':' + encrypted;
|
||||
}
|
||||
|
||||
private decrypt(encryptedData: string): string {
|
||||
const [ivHex, encrypted] = encryptedData.split(':');
|
||||
const iv = Buffer.from(ivHex, 'hex');
|
||||
const decipher = createDecipheriv('aes-256-cbc', this.encryptionKey, iv);
|
||||
let decrypted = decipher.update(encrypted, 'hex', 'utf8');
|
||||
decrypted += decipher.final('utf8');
|
||||
return decrypted;
|
||||
private generateSessionId(): string {
|
||||
return randomBytes(32).toString('hex');
|
||||
}
|
||||
|
||||
createSession(sessionData: SessionData, rememberMe: boolean = false): string {
|
||||
const data = JSON.stringify(sessionData);
|
||||
const encrypted = this.encrypt(data);
|
||||
|
||||
const sessionId = this.generateSessionId();
|
||||
const maxAge = rememberMe ? 60 * 60 * 24 * 30 : 60 * 60 * 24 * 7; // 30 days vs 7 days
|
||||
const expiresAt = Date.now() + (maxAge * 1000);
|
||||
|
||||
console.log(`🍪 Creating session cookie (Remember Me: ${rememberMe}) without explicit domain`);
|
||||
// Store session data server-side
|
||||
sessionStore.set(sessionId, {
|
||||
data: sessionData,
|
||||
expiresAt,
|
||||
rememberMe
|
||||
});
|
||||
|
||||
return serialize(this.cookieName, encrypted, {
|
||||
console.log(`🍪 Creating session cookie (Remember Me: ${rememberMe}) with session ID: ${sessionId.substring(0, 8)}...`);
|
||||
console.log(`📊 Session store size: ${sessionStore.size} sessions`);
|
||||
|
||||
return serialize(this.cookieName, sessionId, {
|
||||
httpOnly: true,
|
||||
secure: process.env.NODE_ENV === 'production',
|
||||
sameSite: 'lax',
|
||||
secure: true,
|
||||
sameSite: 'none',
|
||||
maxAge,
|
||||
path: '/',
|
||||
});
|
||||
}
|
||||
|
||||
getSession(cookieHeader?: string): SessionData | null {
|
||||
if (!cookieHeader) return null;
|
||||
|
||||
const cookies = parse(cookieHeader);
|
||||
const sessionCookie = cookies[this.cookieName];
|
||||
|
||||
if (!sessionCookie) return null;
|
||||
|
||||
try {
|
||||
const decrypted = this.decrypt(sessionCookie);
|
||||
const sessionData = JSON.parse(decrypted) as SessionData;
|
||||
|
||||
// Check if session is expired
|
||||
if (Date.now() > sessionData.tokens.expiresAt) {
|
||||
return null;
|
||||
}
|
||||
|
||||
return sessionData;
|
||||
} catch (error) {
|
||||
console.error('Failed to decrypt session:', error);
|
||||
if (!cookieHeader) {
|
||||
console.log('❌ No cookie header provided');
|
||||
return null;
|
||||
}
|
||||
|
||||
const cookies = parse(cookieHeader);
|
||||
const sessionId = cookies[this.cookieName];
|
||||
|
||||
if (!sessionId) {
|
||||
console.log('❌ No session cookie found');
|
||||
return null;
|
||||
}
|
||||
|
||||
console.log(`🔍 Looking up session: ${sessionId.substring(0, 8)}...`);
|
||||
|
||||
const sessionEntry = sessionStore.get(sessionId);
|
||||
if (!sessionEntry) {
|
||||
console.log('❌ Session not found in store');
|
||||
return null;
|
||||
}
|
||||
|
||||
// Check if session is expired
|
||||
if (Date.now() > sessionEntry.expiresAt) {
|
||||
console.log('❌ Session expired, removing from store');
|
||||
sessionStore.delete(sessionId);
|
||||
return null;
|
||||
}
|
||||
|
||||
// Update last activity
|
||||
sessionEntry.data.lastActivity = Date.now();
|
||||
|
||||
console.log('✅ Session found and valid for user:', sessionEntry.data.user.email);
|
||||
return sessionEntry.data;
|
||||
}
|
||||
|
||||
destroySession(): string {
|
||||
destroySession(cookieHeader?: string): string {
|
||||
if (cookieHeader) {
|
||||
const cookies = parse(cookieHeader);
|
||||
const sessionId = cookies[this.cookieName];
|
||||
|
||||
if (sessionId && sessionStore.has(sessionId)) {
|
||||
sessionStore.delete(sessionId);
|
||||
console.log(`🗑️ Destroyed session: ${sessionId.substring(0, 8)}...`);
|
||||
}
|
||||
}
|
||||
|
||||
return serialize(this.cookieName, '', {
|
||||
httpOnly: true,
|
||||
secure: true,
|
||||
sameSite: 'lax',
|
||||
sameSite: 'none',
|
||||
maxAge: 0,
|
||||
path: '/',
|
||||
});
|
||||
}
|
||||
|
||||
// Helper method to get session stats
|
||||
getSessionStats() {
|
||||
return {
|
||||
totalSessions: sessionStore.size,
|
||||
activeSessions: Array.from(sessionStore.values()).filter(s => Date.now() < s.expiresAt).length
|
||||
};
|
||||
}
|
||||
}
|
||||
|
||||
export function createSessionManager(): SessionManager {
|
||||
const config = useRuntimeConfig();
|
||||
return new SessionManager(config.encryptionKey);
|
||||
return new SessionManager();
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user