login_check.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "log/slog"
  6. "net/http"
  7. "miniflux.app/v2/internal/config"
  8. "miniflux.app/v2/internal/http/cookie"
  9. "miniflux.app/v2/internal/http/request"
  10. "miniflux.app/v2/internal/http/response"
  11. "miniflux.app/v2/internal/locale"
  12. "miniflux.app/v2/internal/ui/form"
  13. "miniflux.app/v2/internal/ui/session"
  14. "miniflux.app/v2/internal/ui/view"
  15. "miniflux.app/v2/internal/urllib"
  16. )
  17. func (h *handler) checkLogin(w http.ResponseWriter, r *http.Request) {
  18. clientIP := request.ClientIP(r)
  19. sess := session.New(h.store, request.SessionID(r))
  20. view := view.New(h.tpl, r, sess)
  21. redirectURL := r.FormValue("redirect_url")
  22. view.Set("redirectURL", redirectURL)
  23. if config.Opts.DisableLocalAuth() {
  24. slog.Warn("blocking local auth login attempt, local auth is disabled",
  25. slog.String("client_ip", clientIP),
  26. slog.String("user_agent", r.UserAgent()),
  27. )
  28. response.HTML(w, r, view.Render("login"))
  29. return
  30. }
  31. authForm := form.NewAuthForm(r)
  32. view.Set("errorMessage", locale.NewLocalizedError("error.bad_credentials").Translate(request.UserLanguage(r)))
  33. view.Set("form", authForm)
  34. if validationErr := authForm.Validate(); validationErr != nil {
  35. translatedErrorMessage := validationErr.Translate(request.UserLanguage(r))
  36. slog.Warn("Validation error during login check",
  37. slog.Bool("authentication_failed", true),
  38. slog.String("client_ip", clientIP),
  39. slog.String("user_agent", r.UserAgent()),
  40. slog.String("username", authForm.Username),
  41. slog.Any("error", translatedErrorMessage),
  42. )
  43. response.HTML(w, r, view.Render("login"))
  44. return
  45. }
  46. if err := h.store.CheckPassword(authForm.Username, authForm.Password); err != nil {
  47. slog.Warn("Incorrect username or password",
  48. slog.Bool("authentication_failed", true),
  49. slog.String("client_ip", clientIP),
  50. slog.String("user_agent", r.UserAgent()),
  51. slog.String("username", authForm.Username),
  52. slog.Any("error", err),
  53. )
  54. response.HTML(w, r, view.Render("login"))
  55. return
  56. }
  57. sessionToken, userID, err := h.store.CreateUserSessionFromUsername(authForm.Username, r.UserAgent(), clientIP)
  58. if err != nil {
  59. response.HTMLServerError(w, r, err)
  60. return
  61. }
  62. slog.Info("User authenticated successfully with username/password",
  63. slog.Bool("authentication_successful", true),
  64. slog.String("client_ip", clientIP),
  65. slog.String("user_agent", r.UserAgent()),
  66. slog.Int64("user_id", userID),
  67. slog.String("username", authForm.Username),
  68. )
  69. h.store.SetLastLogin(userID)
  70. user, err := h.store.UserByID(userID)
  71. if err != nil {
  72. response.HTMLServerError(w, r, err)
  73. return
  74. }
  75. sess.SetLanguage(user.Language)
  76. sess.SetTheme(user.Theme)
  77. http.SetCookie(w, cookie.New(
  78. cookie.CookieUserSessionID,
  79. sessionToken,
  80. config.Opts.HTTPS(),
  81. config.Opts.BasePath(),
  82. ))
  83. if redirectURL != "" && urllib.IsRelativePath(redirectURL) {
  84. response.HTMLRedirect(w, r, redirectURL)
  85. return
  86. }
  87. response.HTMLRedirect(w, r, h.basePath+"/"+user.DefaultHomePage)
  88. }