2
2
package auth
3
3
4
4
import (
5
- "fmt"
6
5
"net/http"
7
6
7
+ "golang.org/x/crypto/bcrypt"
8
+
8
9
"github.com/pkg/errors"
9
10
"github.com/volatiletech/authboss"
10
- "github.com/volatiletech/authboss/internal/response"
11
- "golang.org/x/crypto/bcrypt"
12
11
)
13
12
14
13
const (
15
- tplLogin = "login.html.tpl"
14
+ // PageLogin is for identifying the login page for parsing & validation
15
+ PageLogin = "login"
16
16
)
17
17
18
18
func init () {
@@ -28,7 +28,7 @@ type Auth struct {
28
28
func (a * Auth ) Init (ab * authboss.Authboss ) (err error ) {
29
29
a .Authboss = ab
30
30
31
- if err : = a .Authboss .Config .Core .ViewRenderer .Load (tplLogin ); err != nil {
31
+ if err = a .Authboss .Config .Core .ViewRenderer .Load (PageLogin ); err != nil {
32
32
return err
33
33
}
34
34
@@ -44,106 +44,93 @@ func (a *Auth) Init(ab *authboss.Authboss) (err error) {
44
44
return errors .Errorf ("auth wants to register a logout route but is given an invalid method: %s" , a .Authboss .Config .Modules .LogoutMethod )
45
45
}
46
46
47
- a .Authboss .Config .Core .Router .Get ("/login" , http . HandlerFunc ( loginGet ))
48
- a .Authboss .Config .Core .Router .Post ("/login" , http . HandlerFunc ( loginPost ))
49
- logoutRouteMethod ("/logout" , http . HandlerFunc ( logout ))
47
+ a .Authboss .Config .Core .Router .Get ("/login" , a . Authboss . Core . ErrorHandler . Wrap ( a . LoginGet ))
48
+ a .Authboss .Config .Core .Router .Post ("/login" , a . Authboss . Core . ErrorHandler . Wrap ( a . LoginPost ))
49
+ logoutRouteMethod ("/logout" , a . Authboss . Core . ErrorHandler . Wrap ( a . Logout ))
50
50
51
51
return nil
52
52
}
53
53
54
- func (a * Auth ) loginGet (w http.ResponseWriter , r * http.Request ) error {
55
- data := authboss .NewHTMLData (
56
- "showRemember" , a .IsLoaded ("remember" ),
57
- "showRecover" , a .IsLoaded ("recover" ),
58
- "showRegister" , a .IsLoaded ("register" ),
59
- "primaryID" , a .PrimaryID ,
60
- "primaryIDValue" , "" ,
61
- )
62
- return a .templates .Render (ctx , w , r , tplLogin , data )
54
+ // LoginGet simply displays the login form
55
+ func (a * Auth ) LoginGet (w http.ResponseWriter , r * http.Request ) error {
56
+ return a .Core .Responder .Respond (w , r , http .StatusOK , PageLogin , nil )
63
57
}
64
58
65
- func (a * Auth ) loginPost (w http.ResponseWriter , r * http.Request ) error {
66
- switch r .Method {
67
- case methodGET :
68
- case methodPOST :
69
- key := r .FormValue (a .PrimaryID )
70
- password := r .FormValue ("password" )
71
-
72
- errData := authboss .NewHTMLData (
73
- "error" , fmt .Sprintf ("invalid %s and/or password" , a .PrimaryID ),
74
- "primaryID" , a .PrimaryID ,
75
- "primaryIDValue" , key ,
76
- "showRemember" , a .IsLoaded ("remember" ),
77
- "showRecover" , a .IsLoaded ("recover" ),
78
- "showRegister" , a .IsLoaded ("register" ),
79
- )
80
-
81
- if valid , err := validateCredentials (ctx , key , password ); err != nil {
82
- errData ["error" ] = "Internal server error"
83
- fmt .Fprintf (ctx .LogWriter , "auth: validate credentials failed: %v\n " , err )
84
- return a .templates .Render (ctx , w , r , tplLogin , errData )
85
- } else if ! valid {
86
- if err := a .Events .FireAfter (authboss .EventAuthFail , ctx ); err != nil {
87
- fmt .Fprintf (ctx .LogWriter , "EventAuthFail callback error'd out: %v\n " , err )
88
- }
89
- return a .templates .Render (ctx , w , r , tplLogin , errData )
90
- }
59
+ // LoginPost attempts to validate the credentials passed in
60
+ // to log in a user.
61
+ func (a * Auth ) LoginPost (w http.ResponseWriter , r * http.Request ) error {
62
+ validatable , err := a .Authboss .Core .BodyReader .Read (PageLogin , r )
63
+ if err != nil {
64
+ return err
65
+ }
91
66
92
- interrupted , err := a .Events .FireBefore (authboss .EventAuth , ctx )
93
- if err != nil {
94
- return err
95
- } else if interrupted != authboss .InterruptNone {
96
- var reason string
97
- switch interrupted {
98
- case authboss .InterruptAccountLocked :
99
- reason = "Your account has been locked."
100
- case authboss .InterruptAccountNotConfirmed :
101
- reason = "Your account has not been confirmed."
102
- }
103
- response .Redirect (ctx , w , r , a .AuthLoginFailPath , "" , reason , false )
104
- return nil
105
- }
67
+ // Skip validation since all the validation happens during the database lookup and
68
+ // password check.
69
+ creds := authboss .MustHaveUserValues (validatable )
106
70
107
- ctx .SessionStorer .Put (authboss .SessionKey , key )
108
- ctx .SessionStorer .Del (authboss .SessionHalfAuthKey )
109
- ctx .Values = map [string ]string {authboss .CookieRemember : r .FormValue (authboss .CookieRemember )}
71
+ pid := creds .GetPID ()
72
+ pidUser , err := a .Authboss .Storage .Server .Load (r .Context (), pid )
73
+ if err == authboss .ErrUserNotFound {
74
+ data := authboss.HTMLData {authboss .DataErr : "Invalid Credentials" }
75
+ return a .Authboss .Core .Responder .Respond (w , r , http .StatusOK , PageLogin , data )
76
+ } else if err != nil {
77
+ return err
78
+ }
110
79
111
- if err := a .Events .FireAfter (authboss .EventAuth , ctx ); err != nil {
112
- return err
113
- }
114
- response .Redirect (ctx , w , r , a .AuthLoginOKPath , "" , "" , true )
115
- default :
116
- w .WriteHeader (http .StatusMethodNotAllowed )
80
+ authUser := authboss .MustBeAuthable (pidUser )
81
+ password , err := authUser .GetPassword (r .Context ())
82
+ if err != nil {
83
+ return err
117
84
}
118
85
119
- return nil
120
- }
86
+ err = bcrypt .CompareHashAndPassword ([]byte (password ), []byte (creds .GetPassword ()))
87
+ if err != nil {
88
+ err = a .Authboss .Events .FireAfter (r .Context (), authboss .EventAuthFail )
89
+ if err != nil {
90
+ return err
91
+ }
121
92
122
- func validateCredentials (key , password string ) (bool , error ) {
123
- if err := ctx .LoadUser (key ); err == authboss .ErrUserNotFound {
124
- return false , nil
125
- } else if err != nil {
126
- return false , err
93
+ data := authboss.HTMLData {authboss .DataErr : "Invalid Credentials" }
94
+ return a .Authboss .Core .Responder .Respond (w , r , http .StatusOK , PageLogin , data )
127
95
}
128
96
129
- actualPassword , err := ctx . User . StringErr ( authboss .StorePassword )
97
+ interrupted , err := a . Events . FireBefore ( r . Context (), authboss .EventAuth )
130
98
if err != nil {
131
- return false , err
99
+ return err
100
+ } else if interrupted != authboss .InterruptNone {
101
+ var reason string
102
+ switch interrupted {
103
+ case authboss .InterruptAccountLocked :
104
+ reason = "Your account is locked"
105
+ case authboss .InterruptAccountNotConfirmed :
106
+ reason = "Your account is not confirmed"
107
+ }
108
+ data := authboss.HTMLData {authboss .DataErr : reason }
109
+ return a .Authboss .Core .Responder .Respond (w , r , http .StatusOK , PageLogin , data )
132
110
}
133
111
134
- if err := bcrypt .CompareHashAndPassword ([]byte (actualPassword ), []byte (password )); err != nil {
135
- return false , nil
112
+ authboss .PutSession (w , authboss .SessionKey , pid )
113
+ authboss .DelSession (w , authboss .SessionHalfAuthKey )
114
+
115
+ if err := a .Authboss .Events .FireAfter (r .Context (), authboss .EventAuth ); err != nil {
116
+ return err
136
117
}
137
118
138
- return true , nil
119
+ ro := authboss.RedirectOptions {
120
+ RedirectPath : a .Authboss .Paths .AuthLogoutOK ,
121
+ }
122
+ return a .Authboss .Core .Redirector .Redirect (w , r , ro )
139
123
}
140
124
141
- func (a * Auth ) logout (w http.ResponseWriter , r * http.Request ) error {
142
- ctx .SessionStorer .Del (authboss .SessionKey )
143
- ctx .CookieStorer .Del (authboss .CookieRemember )
144
- ctx .SessionStorer .Del (authboss .SessionLastAction )
145
-
146
- response .Redirect (ctx , w , r , a .AuthLogoutOKPath , "You have logged out" , "" , true )
125
+ // Logout a user
126
+ func (a * Auth ) Logout (w http.ResponseWriter , r * http.Request ) error {
127
+ authboss .DelSession (w , authboss .SessionKey )
128
+ authboss .DelSession (w , authboss .SessionLastAction )
129
+ authboss .DelCookie (w , authboss .CookieRemember )
147
130
148
- return nil
131
+ ro := authboss.RedirectOptions {
132
+ RedirectPath : a .Authboss .Paths .AuthLogoutOK ,
133
+ Success : "You have been logged out" ,
134
+ }
135
+ return a .Authboss .Core .Redirector .Redirect (w , r , ro )
149
136
}
0 commit comments