1
0
Fork 0
mirror of https://github.com/miniflux/v2.git synced 2025-06-27 16:36:00 +00:00
miniflux-v2/ui/login.go

81 lines
2.5 KiB
Go
Raw Normal View History

2017-11-19 21:10:04 -08:00
// Copyright 2017 Frédéric Guillot. All rights reserved.
// Use of this source code is governed by the Apache 2.0
// license that can be found in the LICENSE file.
package ui
2017-11-19 21:10:04 -08:00
import (
"github.com/miniflux/miniflux/http/cookie"
"github.com/miniflux/miniflux/http/handler"
2017-12-15 18:55:57 -08:00
"github.com/miniflux/miniflux/logger"
"github.com/miniflux/miniflux/ui/form"
2017-11-22 22:22:33 -08:00
2017-11-19 21:10:04 -08:00
"github.com/tomasen/realip"
)
2017-11-22 22:22:33 -08:00
// ShowLoginPage shows the login form.
func (c *Controller) ShowLoginPage(ctx *handler.Context, request *handler.Request, response *handler.Response) {
2017-11-19 21:10:04 -08:00
if ctx.IsAuthenticated() {
2017-11-21 18:37:08 -08:00
response.Redirect(ctx.Route("unread"))
2017-11-19 21:10:04 -08:00
return
}
response.HTML().Render("login", ctx.UserLanguage(), tplParams{
2017-12-16 18:07:53 -08:00
"csrf": ctx.CSRF(),
2017-11-19 21:10:04 -08:00
})
}
2017-11-22 22:22:33 -08:00
// CheckLogin validates the username/password and redirects the user to the unread page.
func (c *Controller) CheckLogin(ctx *handler.Context, request *handler.Request, response *handler.Response) {
2017-11-21 18:14:45 -08:00
authForm := form.NewAuthForm(request.Request())
2017-11-19 21:10:04 -08:00
tplParams := tplParams{
"errorMessage": "Invalid username or password.",
2017-12-16 18:07:53 -08:00
"csrf": ctx.CSRF(),
2017-12-22 16:30:17 -08:00
"form": authForm,
2017-11-19 21:10:04 -08:00
}
if err := authForm.Validate(); err != nil {
2017-12-15 18:55:57 -08:00
logger.Error("[Controller:CheckLogin] %v", err)
response.HTML().Render("login", ctx.UserLanguage(), tplParams)
2017-11-19 21:10:04 -08:00
return
}
if err := c.store.CheckPassword(authForm.Username, authForm.Password); err != nil {
2017-12-15 18:55:57 -08:00
logger.Error("[Controller:CheckLogin] %v", err)
response.HTML().Render("login", ctx.UserLanguage(), tplParams)
2017-11-19 21:10:04 -08:00
return
}
2017-12-16 12:15:33 -08:00
sessionToken, err := c.store.CreateUserSession(
2017-11-19 21:10:04 -08:00
authForm.Username,
2017-11-21 18:14:45 -08:00
request.Request().UserAgent(),
realip.RealIP(request.Request()),
2017-11-19 21:10:04 -08:00
)
2017-11-22 22:22:33 -08:00
2017-11-19 21:10:04 -08:00
if err != nil {
2017-11-21 18:30:16 -08:00
response.HTML().ServerError(err)
2017-11-19 21:10:04 -08:00
return
}
2017-12-15 18:55:57 -08:00
logger.Info("[Controller:CheckLogin] username=%s just logged in", authForm.Username)
2017-11-19 21:10:04 -08:00
response.SetCookie(cookie.New(cookie.CookieUserSessionID, sessionToken, c.cfg.IsHTTPS, c.cfg.BasePath()))
2017-11-21 18:37:08 -08:00
response.Redirect(ctx.Route("unread"))
2017-11-19 21:10:04 -08:00
}
2017-11-22 22:22:33 -08:00
// Logout destroy the session and redirects the user to the login page.
func (c *Controller) Logout(ctx *handler.Context, request *handler.Request, response *handler.Response) {
2017-11-21 18:37:08 -08:00
user := ctx.LoggedUser()
2017-11-19 21:10:04 -08:00
if err := c.store.UpdateSessionField(ctx.SessionID(), "language", user.Language); err != nil {
logger.Error("[Controller:Logout] %v", err)
}
2017-12-16 18:07:53 -08:00
if err := c.store.RemoveUserSessionByToken(user.ID, ctx.UserSessionToken()); err != nil {
2017-12-15 18:55:57 -08:00
logger.Error("[Controller:Logout] %v", err)
2017-11-19 21:10:04 -08:00
}
response.SetCookie(cookie.Expired(cookie.CookieUserSessionID, c.cfg.IsHTTPS, c.cfg.BasePath()))
2017-11-21 18:37:08 -08:00
response.Redirect(ctx.Route("login"))
2017-11-19 21:10:04 -08:00
}