login_check.go 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. // SPDX-FileCopyrightText: Copyright The Miniflux Authors. All rights reserved.
  2. // SPDX-License-Identifier: Apache-2.0
  3. package ui // import "miniflux.app/v2/internal/ui"
  4. import (
  5. "log/slog"
  6. "net/http"
  7. "net/url"
  8. "miniflux.app/v2/internal/config"
  9. "miniflux.app/v2/internal/http/cookie"
  10. "miniflux.app/v2/internal/http/request"
  11. "miniflux.app/v2/internal/http/response/html"
  12. "miniflux.app/v2/internal/http/route"
  13. "miniflux.app/v2/internal/locale"
  14. "miniflux.app/v2/internal/ui/form"
  15. "miniflux.app/v2/internal/ui/session"
  16. "miniflux.app/v2/internal/ui/view"
  17. )
  18. func (h *handler) checkLogin(w http.ResponseWriter, r *http.Request) {
  19. clientIP := request.ClientIP(r)
  20. sess := session.New(h.store, request.SessionID(r))
  21. view := view.New(h.tpl, r, sess)
  22. redirectURL := r.FormValue("redirect_url")
  23. view.Set("redirectURL", redirectURL)
  24. if config.Opts.DisableLocalAuth() {
  25. slog.Warn("blocking local auth login attempt, local auth is disabled",
  26. slog.String("client_ip", clientIP),
  27. slog.String("user_agent", r.UserAgent()),
  28. )
  29. html.OK(w, r, view.Render("login"))
  30. return
  31. }
  32. authForm := form.NewAuthForm(r)
  33. view.Set("errorMessage", locale.NewLocalizedError("error.bad_credentials").Translate(request.UserLanguage(r)))
  34. view.Set("form", authForm)
  35. if validationErr := authForm.Validate(); validationErr != nil {
  36. translatedErrorMessage := validationErr.Translate(request.UserLanguage(r))
  37. slog.Warn("Validation error during login check",
  38. slog.Bool("authentication_failed", true),
  39. slog.String("client_ip", clientIP),
  40. slog.String("user_agent", r.UserAgent()),
  41. slog.String("username", authForm.Username),
  42. slog.Any("error", translatedErrorMessage),
  43. )
  44. html.OK(w, r, view.Render("login"))
  45. return
  46. }
  47. if err := h.store.CheckPassword(authForm.Username, authForm.Password); err != nil {
  48. slog.Warn("Incorrect username or password",
  49. slog.Bool("authentication_failed", true),
  50. slog.String("client_ip", clientIP),
  51. slog.String("user_agent", r.UserAgent()),
  52. slog.String("username", authForm.Username),
  53. slog.Any("error", err),
  54. )
  55. html.OK(w, r, view.Render("login"))
  56. return
  57. }
  58. sessionToken, userID, err := h.store.CreateUserSessionFromUsername(authForm.Username, r.UserAgent(), clientIP)
  59. if err != nil {
  60. html.ServerError(w, r, err)
  61. return
  62. }
  63. slog.Info("User authenticated successfully with username/password",
  64. slog.Bool("authentication_successful", true),
  65. slog.String("client_ip", clientIP),
  66. slog.String("user_agent", r.UserAgent()),
  67. slog.Int64("user_id", userID),
  68. slog.String("username", authForm.Username),
  69. )
  70. h.store.SetLastLogin(userID)
  71. user, err := h.store.UserByID(userID)
  72. if err != nil {
  73. html.ServerError(w, r, err)
  74. return
  75. }
  76. sess.SetLanguage(user.Language)
  77. sess.SetTheme(user.Theme)
  78. http.SetCookie(w, cookie.New(
  79. cookie.CookieUserSessionID,
  80. sessionToken,
  81. config.Opts.HTTPS(),
  82. config.Opts.BasePath(),
  83. ))
  84. if redirectURL != "" {
  85. if parsedURL, err := url.Parse(redirectURL); err == nil && !parsedURL.IsAbs() {
  86. html.Redirect(w, r, redirectURL)
  87. return
  88. }
  89. }
  90. html.Redirect(w, r, route.Path(h.router, user.DefaultHomePage))
  91. }