2014-02-05 00:35:32 +01:00
|
|
|
from django.conf import settings
|
2020-01-20 14:17:53 +01:00
|
|
|
from typing import Any, Dict, Optional
|
|
|
|
from zerver.lib.utils import generate_random_token
|
2014-02-05 00:35:32 +01:00
|
|
|
|
2020-01-26 19:01:56 +01:00
|
|
|
import re
|
2014-02-05 00:35:32 +01:00
|
|
|
import redis
|
2020-01-20 14:17:53 +01:00
|
|
|
import ujson
|
2014-02-05 00:35:32 +01:00
|
|
|
|
2020-01-26 17:01:23 +01:00
|
|
|
# Redis accepts keys up to 512MB in size, but there's no reason for us to use such size,
|
|
|
|
# so we want to stay limited to 1024 characters.
|
|
|
|
MAX_KEY_LENGTH = 1024
|
|
|
|
|
2020-01-26 19:01:56 +01:00
|
|
|
class ZulipRedisError(Exception):
|
|
|
|
pass
|
|
|
|
|
|
|
|
class ZulipRedisKeyTooLongError(ZulipRedisError):
|
|
|
|
pass
|
|
|
|
|
|
|
|
class ZulipRedisKeyOfWrongFormatError(ZulipRedisError):
|
2020-01-26 17:01:23 +01:00
|
|
|
pass
|
|
|
|
|
2017-11-05 11:15:10 +01:00
|
|
|
def get_redis_client() -> redis.StrictRedis:
|
2016-08-01 04:51:00 +02:00
|
|
|
return redis.StrictRedis(host=settings.REDIS_HOST, port=settings.REDIS_PORT,
|
|
|
|
password=settings.REDIS_PASSWORD, db=0)
|
2020-01-20 14:17:53 +01:00
|
|
|
|
|
|
|
def put_dict_in_redis(redis_client: redis.StrictRedis, key_format: str,
|
|
|
|
data_to_store: Dict[str, Any],
|
2020-01-23 12:21:55 +01:00
|
|
|
expiration_seconds: int,
|
|
|
|
token_length: int=64) -> str:
|
2020-01-26 17:01:23 +01:00
|
|
|
key_length = len(key_format) - len('{token}') + token_length
|
|
|
|
if key_length > MAX_KEY_LENGTH:
|
|
|
|
error_msg = "Requested key too long in put_dict_in_redis. Key format: %s, token length: %s"
|
|
|
|
raise ZulipRedisKeyTooLongError(error_msg % (key_format, token_length))
|
|
|
|
token = generate_random_token(token_length)
|
|
|
|
key = key_format.format(token=token)
|
2020-01-20 14:17:53 +01:00
|
|
|
with redis_client.pipeline() as pipeline:
|
|
|
|
pipeline.set(key, ujson.dumps(data_to_store))
|
|
|
|
pipeline.expire(key, expiration_seconds)
|
|
|
|
pipeline.execute()
|
|
|
|
|
|
|
|
return key
|
|
|
|
|
2020-01-26 19:01:56 +01:00
|
|
|
def get_dict_from_redis(redis_client: redis.StrictRedis, key_format: str, key: str
|
|
|
|
) -> Optional[Dict[str, Any]]:
|
|
|
|
# This function requires inputting the intended key_format to validate
|
|
|
|
# that the key fits it, as an additionally security measure. This protects
|
|
|
|
# against bugs where a caller requests a key based on user input and doesn't
|
|
|
|
# validate it - which could potentially allow users to poke around arbitrary redis keys.
|
2020-01-26 17:01:23 +01:00
|
|
|
if len(key) > MAX_KEY_LENGTH:
|
|
|
|
error_msg = "Requested key too long in get_dict_from_redis: %s"
|
|
|
|
raise ZulipRedisKeyTooLongError(error_msg % (key,))
|
2020-01-26 19:01:56 +01:00
|
|
|
validate_key_fits_format(key, key_format)
|
|
|
|
|
2020-01-20 14:17:53 +01:00
|
|
|
data = redis_client.get(key)
|
|
|
|
if data is None:
|
|
|
|
return None
|
|
|
|
return ujson.loads(data)
|
2020-01-26 19:01:56 +01:00
|
|
|
|
|
|
|
def validate_key_fits_format(key: str, key_format: str) -> None:
|
|
|
|
assert "{token}" in key_format
|
|
|
|
regex = key_format.format(token=r"[a-z0-9]+")
|
|
|
|
|
|
|
|
if not re.fullmatch(regex, key):
|
|
|
|
raise ZulipRedisKeyOfWrongFormatError("%s does not match format %s" % (key, key_format))
|