mirror of
				https://github.com/zulip/zulip.git
				synced 2025-11-04 05:53:43 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			87 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			87 lines
		
	
	
		
			2.5 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
import re
 | 
						|
import secrets
 | 
						|
from typing import Any, Dict, Mapping, Optional
 | 
						|
 | 
						|
import orjson
 | 
						|
import redis
 | 
						|
from django.conf import settings
 | 
						|
 | 
						|
# Redis accepts keys up to 512MB in size, but there's no reason for us to use such size,
 | 
						|
# so we want to stay limited to 1024 characters.
 | 
						|
MAX_KEY_LENGTH = 1024
 | 
						|
 | 
						|
 | 
						|
class ZulipRedisError(Exception):
 | 
						|
    pass
 | 
						|
 | 
						|
 | 
						|
class ZulipRedisKeyTooLongError(ZulipRedisError):
 | 
						|
    pass
 | 
						|
 | 
						|
 | 
						|
class ZulipRedisKeyOfWrongFormatError(ZulipRedisError):
 | 
						|
    pass
 | 
						|
 | 
						|
 | 
						|
def get_redis_client() -> "redis.StrictRedis[bytes]":
 | 
						|
    return redis.StrictRedis(
 | 
						|
        host=settings.REDIS_HOST,
 | 
						|
        port=settings.REDIS_PORT,
 | 
						|
        password=settings.REDIS_PASSWORD,
 | 
						|
        db=0,
 | 
						|
        decode_responses=False,
 | 
						|
    )
 | 
						|
 | 
						|
 | 
						|
def put_dict_in_redis(
 | 
						|
    redis_client: "redis.StrictRedis[bytes]",
 | 
						|
    key_format: str,
 | 
						|
    data_to_store: Mapping[str, Any],
 | 
						|
    expiration_seconds: int,
 | 
						|
    token_length: int = 64,
 | 
						|
    token: Optional[str] = None,
 | 
						|
) -> str:
 | 
						|
    key_length = len(key_format) - len("{token}") + token_length
 | 
						|
    if key_length > MAX_KEY_LENGTH:
 | 
						|
        raise ZulipRedisKeyTooLongError(
 | 
						|
            f"Requested key too long in put_dict_in_redis. Key format: {key_format}, token length: {token_length}",
 | 
						|
        )
 | 
						|
    if token is None:
 | 
						|
        token = secrets.token_hex(token_length // 2)
 | 
						|
    key = key_format.format(token=token)
 | 
						|
    with redis_client.pipeline() as pipeline:
 | 
						|
        pipeline.set(key, orjson.dumps(data_to_store))
 | 
						|
        pipeline.expire(key, expiration_seconds)
 | 
						|
        pipeline.execute()
 | 
						|
 | 
						|
    return key
 | 
						|
 | 
						|
 | 
						|
def get_dict_from_redis(
 | 
						|
    redis_client: "redis.StrictRedis[bytes]",
 | 
						|
    key_format: str,
 | 
						|
    key: str,
 | 
						|
) -> Optional[Dict[str, Any]]:
 | 
						|
    # This function requires inputting the intended key_format to validate
 | 
						|
    # that the key fits it, as an additionally security measure. This protects
 | 
						|
    # against bugs where a caller requests a key based on user input and doesn't
 | 
						|
    # validate it - which could potentially allow users to poke around arbitrary Redis keys.
 | 
						|
    if len(key) > MAX_KEY_LENGTH:
 | 
						|
        raise ZulipRedisKeyTooLongError(
 | 
						|
            f"Requested key too long in get_dict_from_redis: {key}",
 | 
						|
        )
 | 
						|
    validate_key_fits_format(key, key_format)
 | 
						|
 | 
						|
    data = redis_client.get(key)
 | 
						|
    if data is None:
 | 
						|
        return None
 | 
						|
    return orjson.loads(data)
 | 
						|
 | 
						|
 | 
						|
def validate_key_fits_format(key: str, key_format: str) -> None:
 | 
						|
    assert "{token}" in key_format
 | 
						|
    regex = key_format.format(token=r"[a-zA-Z0-9]+")
 | 
						|
 | 
						|
    if not re.fullmatch(regex, key):
 | 
						|
        raise ZulipRedisKeyOfWrongFormatError(f"{key} does not match format {key_format}")
 |