login_check.go 2.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "errors"
  6. "log/slog"
  7. "net/http"
  8. "miniflux.app/v2/internal/config"
  9. "miniflux.app/v2/internal/http/request"
  10. "miniflux.app/v2/internal/http/response"
  11. "miniflux.app/v2/internal/locale"
  12. "miniflux.app/v2/internal/ui/form"
  13. "miniflux.app/v2/internal/ui/view"
  14. "miniflux.app/v2/internal/urllib"
  15. )
  16. func (h *handler) checkLogin(w http.ResponseWriter, r *http.Request) {
  17. clientIP := request.ClientIP(r)
  18. view := view.New(h.tpl, r)
  19. redirectURL := r.FormValue("redirect_url")
  20. view.Set("redirectURL", redirectURL)
  21. if config.Opts.DisableLocalAuth() {
  22. slog.Warn("blocking local auth login attempt, local auth is disabled",
  23. slog.String("client_ip", clientIP),
  24. slog.String("user_agent", r.UserAgent()),
  25. )
  26. response.HTML(w, r, view.Render("login"))
  27. return
  28. }
  29. authForm := form.NewAuthForm(r)
  30. view.Set("errorMessage", locale.NewLocalizedError("error.bad_credentials").Translate(request.WebSession(r).Language()))
  31. view.Set("form", authForm)
  32. if validationErr := authForm.Validate(); validationErr != nil {
  33. translatedErrorMessage := validationErr.Translate(request.WebSession(r).Language())
  34. slog.Warn("Validation error during login check",
  35. slog.Bool("authentication_failed", true),
  36. slog.String("client_ip", clientIP),
  37. slog.String("user_agent", r.UserAgent()),
  38. slog.String("username", authForm.Username),
  39. slog.Any("error", translatedErrorMessage),
  40. )
  41. response.HTML(w, r, view.Render("login"))
  42. return
  43. }
  44. if err := h.store.CheckPassword(authForm.Username, authForm.Password); err != nil {
  45. slog.Warn("Incorrect username or password",
  46. slog.Bool("authentication_failed", true),
  47. slog.String("client_ip", clientIP),
  48. slog.String("user_agent", r.UserAgent()),
  49. slog.String("username", authForm.Username),
  50. slog.Any("error", err),
  51. )
  52. response.HTML(w, r, view.Render("login"))
  53. return
  54. }
  55. user, err := h.store.UserByUsername(authForm.Username)
  56. if err != nil {
  57. response.HTMLServerError(w, r, err)
  58. return
  59. }
  60. if user == nil {
  61. response.HTMLServerError(w, r, errors.New("authenticated user not found"))
  62. return
  63. }
  64. slog.Info("User authenticated successfully with username/password",
  65. slog.Bool("authentication_successful", true),
  66. slog.String("client_ip", clientIP),
  67. slog.String("user_agent", r.UserAgent()),
  68. slog.Int64("user_id", user.ID),
  69. slog.String("username", authForm.Username),
  70. )
  71. h.store.SetLastLogin(user.ID)
  72. if err := authenticateWebSession(w, r, h.store, user); err != nil {
  73. response.HTMLServerError(w, r, err)
  74. return
  75. }
  76. if redirectURL != "" && urllib.IsRelativePath(redirectURL) {
  77. response.HTMLRedirect(w, r, redirectURL)
  78. return
  79. }
  80. response.HTMLRedirect(w, r, h.basePath+"/"+user.DefaultHomePage)
  81. }