login.go 3.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152
  1. package api
  2. import (
  3. "net/url"
  4. "github.com/grafana/grafana/pkg/api/dtos"
  5. "github.com/grafana/grafana/pkg/bus"
  6. "github.com/grafana/grafana/pkg/log"
  7. "github.com/grafana/grafana/pkg/login"
  8. "github.com/grafana/grafana/pkg/metrics"
  9. "github.com/grafana/grafana/pkg/middleware"
  10. m "github.com/grafana/grafana/pkg/models"
  11. "github.com/grafana/grafana/pkg/setting"
  12. "github.com/grafana/grafana/pkg/util"
  13. )
  14. const (
  15. VIEW_INDEX = "index"
  16. )
  17. func LoginView(c *middleware.Context) {
  18. viewData, err := setIndexViewData(c)
  19. if err != nil {
  20. c.Handle(500, "Failed to get settings", err)
  21. return
  22. }
  23. enabledOAuths := make(map[string]interface{})
  24. for key, oauth := range setting.OAuthService.OAuthInfos {
  25. enabledOAuths[key] = map[string]string{"name": oauth.Name}
  26. }
  27. viewData.Settings["oauth"] = enabledOAuths
  28. viewData.Settings["disableUserSignUp"] = !setting.AllowUserSignUp
  29. viewData.Settings["loginHint"] = setting.LoginHint
  30. viewData.Settings["disableLoginForm"] = setting.DisableLoginForm
  31. if loginError, ok := c.Session.Get("loginError").(string); ok {
  32. c.Session.Set("loginError", "") // TODO: is there a proper way to delete a session var?
  33. viewData.Settings["loginError"] = loginError
  34. }
  35. if !tryLoginUsingRememberCookie(c) {
  36. c.HTML(200, VIEW_INDEX, viewData)
  37. return
  38. }
  39. if redirectTo, _ := url.QueryUnescape(c.GetCookie("redirect_to")); len(redirectTo) > 0 {
  40. c.SetCookie("redirect_to", "", -1, setting.AppSubUrl+"/")
  41. c.Redirect(redirectTo)
  42. return
  43. }
  44. c.Redirect(setting.AppSubUrl + "/")
  45. }
  46. func tryLoginUsingRememberCookie(c *middleware.Context) bool {
  47. // Check auto-login.
  48. uname := c.GetCookie(setting.CookieUserName)
  49. if len(uname) == 0 {
  50. return false
  51. }
  52. isSucceed := false
  53. defer func() {
  54. if !isSucceed {
  55. log.Trace("auto-login cookie cleared: %s", uname)
  56. c.SetCookie(setting.CookieUserName, "", -1, setting.AppSubUrl+"/")
  57. c.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubUrl+"/")
  58. return
  59. }
  60. }()
  61. userQuery := m.GetUserByLoginQuery{LoginOrEmail: uname}
  62. if err := bus.Dispatch(&userQuery); err != nil {
  63. return false
  64. }
  65. user := userQuery.Result
  66. // validate remember me cookie
  67. if val, _ := c.GetSuperSecureCookie(
  68. util.EncodeMd5(user.Rands+user.Password), setting.CookieRememberName); val != user.Login {
  69. return false
  70. }
  71. isSucceed = true
  72. loginUserWithUser(user, c)
  73. return true
  74. }
  75. func LoginApiPing(c *middleware.Context) {
  76. if !tryLoginUsingRememberCookie(c) {
  77. c.JsonApiErr(401, "Unauthorized", nil)
  78. return
  79. }
  80. c.JsonOK("Logged in")
  81. }
  82. func LoginPost(c *middleware.Context, cmd dtos.LoginCommand) Response {
  83. authQuery := login.LoginUserQuery{
  84. Username: cmd.User,
  85. Password: cmd.Password,
  86. }
  87. if err := bus.Dispatch(&authQuery); err != nil {
  88. if err == login.ErrInvalidCredentials {
  89. return ApiError(401, "Invalid username or password", err)
  90. }
  91. return ApiError(500, "Error while trying to authenticate user", err)
  92. }
  93. user := authQuery.User
  94. loginUserWithUser(user, c)
  95. result := map[string]interface{}{
  96. "message": "Logged in",
  97. }
  98. if redirectTo, _ := url.QueryUnescape(c.GetCookie("redirect_to")); len(redirectTo) > 0 {
  99. result["redirectUrl"] = redirectTo
  100. c.SetCookie("redirect_to", "", -1, setting.AppSubUrl+"/")
  101. }
  102. metrics.M_Api_Login_Post.Inc(1)
  103. return Json(200, result)
  104. }
  105. func loginUserWithUser(user *m.User, c *middleware.Context) {
  106. if user == nil {
  107. log.Error(3, "User login with nil user")
  108. }
  109. days := 86400 * setting.LogInRememberDays
  110. if days > 0 {
  111. c.SetCookie(setting.CookieUserName, user.Login, days, setting.AppSubUrl+"/")
  112. c.SetSuperSecureCookie(util.EncodeMd5(user.Rands+user.Password), setting.CookieRememberName, user.Login, days, setting.AppSubUrl+"/")
  113. }
  114. c.Session.Set(middleware.SESS_KEY_USERID, user.Id)
  115. }
  116. func Logout(c *middleware.Context) {
  117. c.SetCookie(setting.CookieUserName, "", -1, setting.AppSubUrl+"/")
  118. c.SetCookie(setting.CookieRememberName, "", -1, setting.AppSubUrl+"/")
  119. c.Session.Destory(c)
  120. c.Redirect(setting.AppSubUrl + "/login")
  121. }