While the basic usage examples are a perfectly acceptable way to utilize Zend Framework sessions, there are some
best practices to consider. Consider the
Zend_Auth
example
that transparently uses Zend_Session_Namespace by default to persist authentication tokens. This example shows
one approach to quickly and easily integrate Zend_Session_Namespace and Zend_Auth.
If you want all requests to have a session and use Zend Framework sessions, then start the session in the bootstrap file:
Exemplo 30.6. Starting the Global Session
<?php ... require_once 'Zend/Session.php'; Zend_Session::start(); ... ?>
By starting the session in the bootstrap file, you avoid the possibility that your session might be started
after headers have been sent to the browser, which results in an exception, and possibly a broken page for
website viewers. Various advanced features require Zend_Session::start()
first. (More on
advanced features later.)
There are four ways to start a session, when using Zend_Session. Two are wrong.
1. Wrong: Do not set PHP's session.auto_start ini setting in either php.ini or .htaccess
(http://www.php.net/manual/en/ref.session.php#ini.session.auto-start). If you do not have the
ability to disable this setting in php.ini, you are using mod_php (or equivalent), and the setting
is already enabled in php.ini, then add php_value session.auto_start 0
to your
.htaccess file (usually in your HTML document root directory).
2. Wrong: Do not use PHP's
session_start()
function directly. If you use session_start()
directly, and then start using
Zend_Session_Namespace, an exception will be thrown by Zend_Session::start()
("session
has already been started"). If you call session_start()
, after using
Zend_Session_Namespace or starting Zend_Session::start()
explicitly, an error of level
E_NOTICE will be generated, and the call will be ignored.
3. Correct: Use Zend_Session::start()
. If you want all requests to have and use
sessions, then place this function call early and unconditionally in your ZF bootstrap code.
Sessions have some overhead. If some requests need sessions, but other requests will not need to use
sessions, then:
Unconditionally, set the strict
option to true (see
Zend_Session::setOptions()
) in your userland bootstrap.
Call Zend_Session::start()
, only for requests that need to use sessions, before
the first call to new Zend_Session_Namespace()
.
Use new Zend_Session_Namespace()
normally, where needed, but make sure
Zend_Session::start()
has been called previously.
The strict
option prevents new Zend_Session_Namespace()
from automatically
starting the session using Zend_Session::start()
. Thus, this option helps developers of
userland ZF applications enforce a design decision to avoid using sessions for certain requests,
since an error will be thrown when using this option and instantiating Zend_Session_Namespace,
before an explicit call to Zend_Session::start()
. Do not use this option in ZF core
library code, because only userland developers should make this design choice. Similarly, all
"library" developers should carefully consider the impact of using
Zend_Session::setOptions()
on users of their library code, since these options have
global side-effects (as do the underlying options for ext/session).
4. Correct: Just use new Zend_Session_Namespace()
whenever needed, and the session will
be automatically started within Zend_Session. This offers extremely simple usage that works well in
most situations. However, you then become responsible for ensuring that the first new
Zend_Session_Namespace()
happens before any output (i.e.
HTTP headers
) has been sent by PHP to the client, if you are using the default, cookie-based sessions (strongly
recommended). See
Seção 30.4.3.1, “Headers already sent”
for more information.
Session namespaces can be locked, to prevent further alterations to the data in that namespace. Use
Zend_Session_Namespace's lock()
to make a specific namespace read-only, unLock()
to make a read-only namespace read-write, and isLocked()
to test if a namespace has been
previously locked. Locks are transient and do not persist from one request to the next. Locking the
namespace has no effect on setter methods of objects stored in the namespace, but does prevent the use of
the namespace's setter method to remove or replace objects stored directly in the namespace. Similarly,
locking Zend_Session_Namespace namespaces does not prevent the use of symbol table aliases to the same data
(see
PHP references
).
Exemplo 30.7. Locking Session Namespaces
<?php // assuming: $userProfileNamespace = new Zend_Session_Namespace('userProfileNamespace'); // marking session as read only locked $userProfileNamespace->lock(); // unlocking read-only lock if ($userProfileNamespace->isLocked()) { $userProfileNamespace->unLock(); } ?>
There are numerous ideas for how to manage models in MVC paradigms for the Web, including creating presentation models for use by views. Sometimes existing data, whether part of your domain model or not, is adequate for the task. To discourage views from applying any processing logic to alter such data, consider locking session namespaces before permitting views to access this subset of your "presentation" model.
Exemplo 30.8. Locking Sessions in Views
<?php class FooModule_View extends Zend_View { public function show($name) { if (!isset($this->mySessionNamespace)) { $this->mySessionNamespace = Zend::registry('FooModule'); } if ($this->mySessionNamespace->isLocked()) { return parent::render($name); } $this->mySessionNamespace->lock(); $return = parent::render($name); $this->mySessionNamespace->unLock(); return $return; } } ?>
Limits can be placed on the longevity of both namespaces and individual keys in namespaces. Common use cases
include passing temporary information between requests, and reducing exposure to certain security risks by
removing access to potentially sensitive information some time after authentication occurred. Expiration can
be based on elapsed seconds, or based on the concept of "hops", where a hop occurs for each successive
request that activates the namespace via at least one $space = new
Zend_Session_Namespace('myspace');
.
Exemplo 30.9. Expiration Examples
<?php $s = new Zend_Session_Namespace('expireAll'); $s->a = 'apple'; $s->p = 'pear'; $s->o = 'orange'; $s->setExpirationSeconds(5, 'a'); // expire only the key "a" in 5 seconds // expire entire namespace in 5 "hops" $s->setExpirationHops(5); $s->setExpirationSeconds(60); // The "expireAll" namespace will be marked "expired" on // the first request received after 60 seconds have elapsed, // or in 5 hops, whichever happens first. ?>
When working with data expiring from the session in the current request, care should be used when retrieving it. Although the data is returned by reference, modifying the data will not make expiring data persist past the current request. In order to "reset" the expiration time, fetch the data into temporary variables, use the namespace to unset it, and then set the appropriate keys again.
Namespaces can also be used to separate session access by controllers to protect variables from contamination. For example, the 'Zend_Auth' controller might keep its session state data separate from all other controllers.
Exemplo 30.10. Namespaced Sessions for Controllers with Automatic Expiration
<?php require_once 'Zend/Session.php'; // question view controller $testSpace = new Zend_Session_Namespace('testSpace'); $testSpace->setExpirationSeconds(300, "accept_answer"); // expire only this variable $testSpace->accept_answer = true; -- // answer processing controller $testSpace = new Zend_Session_Namespace('testSpace'); if ($testSpace->accept_answer === true) { // within time } else { // not within time } ?>
We recommend using session locking (see above) instead of the feature below, which places extra management burden on the developer to pass any Zend_Session_Namespace instances into whatever functions and objects need access to each namespace.
When constructing the first instance of Zend_Session_Namespace attached to a specific namespace, you can
also instruct Zend_Session_Namespace to not make any more instances for that namespace. Thus, any future
attempts to construct a Zend_Session_Namespace instance having the same namespace will throw an error. Such
behavior is optional, and not the default behavior, but remains available to those who prefer to pass around
a single instance object for each namespace. This increases protection from changes by components that
should not modify a particular session namespace, because they won't have easy access. However, limiting a
namespace to a single instance may lead to more code or more complex code, as it removes access to the
convient $aNamespace = new Zend_Session_Namespace('aNamespace');
, after the first intance has
been created, as follows in the example below:
Exemplo 30.11. Limiting to Single Instances
<?php require_once 'Zend/Session.php'; $authSpaceAccessor1 = new Zend_Session_Namespace('Zend_Auth'); $authSpaceAccessor2 = new Zend_Session_Namespace('Zend_Auth', Zend_Session_Namespace::SINGLE_INSTANCE); $authSpaceAccessor1->foo = 'bar'; assert($authSpaceAccessor2->foo, 'bar'); // passes doSomething($options, $authSpaceAccessor2); // pass the accessor to wherever it is needed . . . $aNamespaceObject = new Zend_Session_Namespace('Zend_Auth'); // this will throw an error ?>
The second parameter in the constructor above will tell Zend_Session_Namespace that any future
Zend_Session's that are instantiated with the 'Zend_Auth' namespace are not allowed, and will thus cause an
exception. Since new Zend_Session_Namespace('Zend_Auth')
will not be allowed after the code
above has been executed, the developer becomes responsible for storing the instance object
($authSpaceAccessor2
in the example above) somewhere, if access to this session namespace is
needed at a later time during the same request. For example, a developer may store the instance in a static
variable, or pass it to other methods that might need access to this session namespace. Session locking (see
above) provides a more convenient, and less burdensome approach to limiting access to namespaces.
Modifying an array inside a namespace does not work. The simplest solution is to store arrays after all desired values have been set. ZF-800 documents a known issue affecting many PHP applications using magic methods and arrays.
Exemplo 30.12. Known problem with arrays
<?php $sessionNamespace = new Zend_Session_Namespace('Foo'); $sessionNamespace->array = array(); $sessionNamespace->array['testKey'] = 1; // does not work before PHP 5.2.1 ?>
If you need to modify the array after assigning it to a session namespace key, fetch the array, then modify it and save the array back to the session namespace.
Exemplo 30.13. Workaround: fetch, modify, save
<?php $sessionNamespace = new Zend_Session_Namespace('Foo'); $sessionNamespace->array = array('tree' => 'apple'); $tmp = $sessionNamespace->array; $tmp['fruit'] = 'peach'; $sessionNamespace->array = $tmp; ?>
Alternatively, store an array containing a reference to the desired array, and then access it indirectly.
If your authentication adapter for Zend_Auth
returns a result where the authorization identity
is an object (not recommended), instead of an array, then make sure to require your authorization identity
class definition before starting the session. Instead, we recommend storing the authorization ids computed
within an authentication adapter inside a well-known key in a session namespace. For example, the default
behavior of Zend_Auth
places this in the 'storage' key of the 'Zend_Auth' namespace.
If you tell Zend_Auth
to not persist authentication tokens in sessions, then you can manually
store the authorization id in the session namespace, in a well-known location in a session namespace of your
choice. Often, applications have specific needs about where to store credentials used (if any) and
"authorization" identity. Applications often map authentication identities (e.g. usernames) to authorization
identities (e.g. a uniquely assigned integer) during authentication, which would occur in the Zend_Auth
authentication adapter's authenticate()
method.
Exemplo 30.15. Example: Simplified access of authorization ids
<?php // pre-authentication request require_once 'Zend/Auth/Adapter/Digest.php'; $adapter = new Zend_Auth_Adapter_Digest($filename, $realm, $username, $password); $result = $adapter->authenticate(); require_once 'Zend/Session/Namespace.php'; $namespace = new Zend_Session_Namespace('Zend_Auth'); if ($result->isValid()) { $namespace->authorizationId = $result->getIdentity(); $namespace->date = time(); } else { $namespace->attempts++; } // subsequent requests require_once 'Zend/Session.php'; Zend_Session::start(); $namespace = new Zend_Session_Namespace('Zend_Auth'); echo "Valid: ", (empty($namespace->authorizationId) ? 'No' : 'Yes'), "\n"'; echo "Authorization / user Id: ", (empty($namespace->authorizationId) ? 'none' : print_r($namespace->authorizationId, true)), "\n"'; echo "Authentication attempts: ", (empty($namespace->attempts) ? '0' : $namespace->attempts), "\n"'; echo "Authenticated on: ", (empty($namespace->date) ? 'No' : date(DATE_ATOM, $namespace->date), "\n"'; ?>
Authorization ids stored client-side are subject to privilege escalation vulnerabilities, if these ids are used and trusted by the server, unless, for example, the id is duplicated on the server-side (e.g. in the session) and then cross-checked with the authorization id claimed by the client for the in-effect session. We are differentiating between "authentication ids" (e.g. usernames) and "authorization ids" (e.g. user id #101 in the users DB table).
The latter is not uncommon for performance reasons, such as helping select from a pool of servers caching session information to help solve chicken-and-egg problems. Often debates ensue about whether to use the real authorization id in the cookie, or some substitute that aids in mapping to the real authorization id (or session or server(s) holding the user's session/profile, etc.), as some system security architects wish to prevent true "DB primary keys" from escaping into the wild. These architects try and obtain some level of protection by obfuscation in the event of a SQL injection vulnerability in their system. Not everyone uses auto-increment strategies for authorization ids.
The Zend Framework relies on PHPUnit to facilitate testing of itself. Many developers extend the existing
suite of unit tests to cover the code in their applications. The exception
"Zend_Session is currently marked as read-only" is thrown while
performing unit tests, if any write-related methods are used after ending the session. However, unit tests
using Zend_Session require extra attention, because closing (Zend_Session::writeClose()
), or
destroying a session (Zend_Session::destroy()
) prevents any further setting or unsetting of
keys in any Zend_Session_Namespace. This behavior is a direct result of the underlying ext/session mechanism
and PHP's session_destroy()
and session_write_close()
, which has no "undo"
mechanism to facilitate setup/teardown with unit tests.
To work around this, see the unit test testSetExpirationSeconds()
in
tests/Zend/Session/SessionTest.php and SessionTestHelper.php
, which make use of PHP's
exec()
to launch a separate process. The new process more accurately simulates a second,
successive request from a browser. The separate process begins with a "clean" session, just like any PHP
script execution for a web request. Also, any changes to $_SESSION[]
made in the calling
process become available to the child process, provided the parent closed the session before using
exec()
Exemplo 30.16. Using PHPUnit to test code written using Zend_Session*
<?php // testing setExpirationSeconds() require 'tests/Zend/Session/SessionTestHelper.php'; // also see SessionTest.php in trunk/ $script = 'SessionTestHelper.php'; $s = new Zend_Session_Namespace('space'); $s->a = 'apple'; $s->o = 'orange'; $s->setExpirationSeconds(5); Zend_Session::regenerateId(); $id = Zend_Session::getId(); session_write_close(); // release session so process below can use it sleep(4); // not long enough for things to expire exec($script . "expireAll $id expireAll", $result); $result = $this->sortResult($result); $expect = ';a === apple;o === orange;p === pear'; $this->assertTrue($result === $expect, "iteration over default Zend_Session namespace failed; expecting result === '$expect', but got '$result'"); sleep(2); // long enough for things to expire (total of 6 seconds waiting, but expires in 5) exec($script . "expireAll $id expireAll", $result); $result = array_pop($result); $this->assertTrue($result === '', "iteration over default Zend_Session namespace failed; expecting result === '', but got '$result')"); session_start(); // resume artificially suspended session // We could split this into a separate test, but actually, if anything leftover from above // contaminates the tests below, that is also a bug that we want to know about. $s = new Zend_Session_Namespace('expireGuava'); $s->setExpirationSeconds(5, 'g'); // now try to expire only 1 of the keys in the namespace $s->g = 'guava'; $s->p = 'peach'; $s->p = 'plum'; session_write_close(); // release session so process below can use it sleep(6); // not long enough for things to expire exec($script . "expireAll $id expireGuava", $result); $result = $this->sortResult($result); session_start(); // resume artificially suspended session $this->assertTrue($result === ';p === plum', "iteration over named Zend_Session namespace failed (result=$result)"); ?>