login_check.go 2.8 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "log/slog"
  6. "net/http"
  7. "miniflux.app/v2/internal/config"
  8. "miniflux.app/v2/internal/http/cookie"
  9. "miniflux.app/v2/internal/http/request"
  10. "miniflux.app/v2/internal/http/response/html"
  11. "miniflux.app/v2/internal/http/route"
  12. "miniflux.app/v2/internal/locale"
  13. "miniflux.app/v2/internal/ui/form"
  14. "miniflux.app/v2/internal/ui/session"
  15. "miniflux.app/v2/internal/ui/view"
  16. )
  17. func (h *handler) checkLogin(w http.ResponseWriter, r *http.Request) {
  18. clientIP := request.ClientIP(r)
  19. sess := session.New(h.store, request.SessionID(r))
  20. view := view.New(h.tpl, r, sess)
  21. if config.Opts.DisableLocalAuth() {
  22. slog.Warn("blocking local auth login attempt, local auth is disabled",
  23. slog.String("client_ip", clientIP),
  24. slog.String("user_agent", r.UserAgent()),
  25. )
  26. html.OK(w, r, view.Render("login"))
  27. return
  28. }
  29. authForm := form.NewAuthForm(r)
  30. view.Set("errorMessage", locale.NewLocalizedError("error.bad_credentials").Translate(request.UserLanguage(r)))
  31. view.Set("form", authForm)
  32. if validationErr := authForm.Validate(); validationErr != nil {
  33. translatedErrorMessage := validationErr.Translate(request.UserLanguage(r))
  34. slog.Warn("Validation error during login check",
  35. slog.Bool("authentication_failed", true),
  36. slog.String("client_ip", clientIP),
  37. slog.String("user_agent", r.UserAgent()),
  38. slog.String("username", authForm.Username),
  39. slog.Any("error", translatedErrorMessage),
  40. )
  41. html.OK(w, r, view.Render("login"))
  42. return
  43. }
  44. if err := h.store.CheckPassword(authForm.Username, authForm.Password); err != nil {
  45. slog.Warn("Incorrect username or password",
  46. slog.Bool("authentication_failed", true),
  47. slog.String("client_ip", clientIP),
  48. slog.String("user_agent", r.UserAgent()),
  49. slog.String("username", authForm.Username),
  50. slog.Any("error", err),
  51. )
  52. html.OK(w, r, view.Render("login"))
  53. return
  54. }
  55. sessionToken, userID, err := h.store.CreateUserSessionFromUsername(authForm.Username, r.UserAgent(), clientIP)
  56. if err != nil {
  57. html.ServerError(w, r, err)
  58. return
  59. }
  60. slog.Info("User authenticated successfully with username/password",
  61. slog.Bool("authentication_successful", true),
  62. slog.String("client_ip", clientIP),
  63. slog.String("user_agent", r.UserAgent()),
  64. slog.Int64("user_id", userID),
  65. slog.String("username", authForm.Username),
  66. )
  67. h.store.SetLastLogin(userID)
  68. user, err := h.store.UserByID(userID)
  69. if err != nil {
  70. html.ServerError(w, r, err)
  71. return
  72. }
  73. sess.SetLanguage(user.Language)
  74. sess.SetTheme(user.Theme)
  75. http.SetCookie(w, cookie.New(
  76. cookie.CookieUserSessionID,
  77. sessionToken,
  78. config.Opts.HTTPS,
  79. config.Opts.BasePath(),
  80. ))
  81. html.Redirect(w, r, route.Path(h.router, user.DefaultHomePage))
  82. }