Coverage Report - org.apache.shiro.session.mgt.ValidatingSessionManager
 
Classes in this File Line Coverage Branch Coverage Complexity
ValidatingSessionManager
N/A
N/A
1
 
 1  
 /*
 2  
  * Licensed to the Apache Software Foundation (ASF) under one
 3  
  * or more contributor license agreements.  See the NOTICE file
 4  
  * distributed with this work for additional information
 5  
  * regarding copyright ownership.  The ASF licenses this file
 6  
  * to you under the Apache License, Version 2.0 (the
 7  
  * "License"); you may not use this file except in compliance
 8  
  * with the License.  You may obtain a copy of the License at
 9  
  *
 10  
  *     http://www.apache.org/licenses/LICENSE-2.0
 11  
  *
 12  
  * Unless required by applicable law or agreed to in writing,
 13  
  * software distributed under the License is distributed on an
 14  
  * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 15  
  * KIND, either express or implied.  See the License for the
 16  
  * specific language governing permissions and limitations
 17  
  * under the License.
 18  
  */
 19  
 package org.apache.shiro.session.mgt;
 20  
 
 21  
 /**
 22  
  * A ValidatingSessionManager is a SessionManager that can proactively validate any or all sessions
 23  
  * that may be expired.
 24  
  *
 25  
  * @since 0.1
 26  
  */
 27  
 public interface ValidatingSessionManager extends SessionManager {
 28  
 
 29  
     /**
 30  
      * Performs session validation for all open/active sessions in the system (those that
 31  
      * have not been stopped or expired), and validates each one.  If a session is
 32  
      * found to be invalid (e.g. it has expired), it is updated and saved to the EIS.
 33  
      * <p/>
 34  
      * This method is necessary in order to handle orphaned sessions and is expected to be run at
 35  
      * a regular interval, such as once an hour, once a day or once a week, etc.
 36  
      * The &quot;best&quot; frequency to run this method is entirely dependent upon the application
 37  
      * and would be based on factors such as performance, average number of active users, hours of
 38  
      * least activity, and other things.
 39  
      * <p/>
 40  
      * Most enterprise applications use a request/response programming model.
 41  
      * This is obvious in the case of web applications due to the HTTP protocol, but it is
 42  
      * equally true of remote client applications making remote method invocations.  The server
 43  
      * essentially sits idle and only &quot;works&quot; when responding to client requests and/or
 44  
      * method invocations.  This type of model is particularly efficent since it means the
 45  
      * security system only has to validate a session during those cases.  Such
 46  
      * &quot;lazy&quot; behavior enables the system to lie stateless and/or idle and only incur
 47  
      * overhead for session validation when necessary.
 48  
      * <p/>
 49  
      * However, if a client forgets to log-out, or in the event of a server failure, it is
 50  
      * possible for sessions to be orphaned since no further requests would utilize that session.
 51  
      * Because of these lower-probability cases, it might be required to regularly clean-up the sessions
 52  
      * maintained by the system, especially if sessions are backed by a persistent data store.
 53  
      * <p/>
 54  
      * Even in applications that aren't primarily based on a request/response model,
 55  
      * such as those that use enterprise asynchronous messaging (where data is pushed to
 56  
      * a client without first receiving a client request), it is almost always acceptable to
 57  
      * utilize this lazy approach and run this method at defined interval.
 58  
      * <p/>
 59  
      * Systems that want to proactively validate individual sessions may simply call the
 60  
      * {@link #getSession(SessionKey) getSession(SessionKey)} method on any
 61  
      * {@code ValidatingSessionManager} instance as that method is expected to
 62  
      * validate the session before retrieving it.  Note that even with proactive calls to {@code getSession},
 63  
      * this {@code validateSessions()} method should be invoked regularly anyway to <em>guarantee</em> no
 64  
      * orphans exist.
 65  
      * <p/>
 66  
      * <b>Note:</b> Shiro supports automatic execution of this method at a regular interval
 67  
      * by using {@link SessionValidationScheduler}s.  The Shiro default SecurityManager implementations
 68  
      * needing session validation will create and use one by default if one is not provided by the
 69  
      * application configuration.
 70  
      */
 71  
     void validateSessions();
 72  
 }