aboutsummaryrefslogtreecommitdiff
path: root/http_handle_login.go
diff options
context:
space:
mode:
authorRunxi Yu <me@runxiyu.org>2025-03-05 08:51:17 +0800
committerRunxi Yu <me@runxiyu.org>2025-03-05 08:51:17 +0800
commit7c341685f878aa8fd4c49788cf8cc0d8c5c6e127 (patch)
tree5295f1f4020e85c065e98fcb88ec217ad66e078a /http_handle_login.go
parentconfig: Add explanatory comments (diff)
downloadforge-7c341685f878aa8fd4c49788cf8cc0d8c5c6e127.tar.gz
forge-7c341685f878aa8fd4c49788cf8cc0d8c5c6e127.tar.zst
forge-7c341685f878aa8fd4c49788cf8cc0d8c5c6e127.zip
*: Replace some := with var
Diffstat (limited to 'http_handle_login.go')
-rw-r--r--http_handle_login.go35
1 files changed, 22 insertions, 13 deletions
diff --git a/http_handle_login.go b/http_handle_login.go
index 545cc85..1d23d3c 100644
--- a/http_handle_login.go
+++ b/http_handle_login.go
@@ -16,17 +16,28 @@ import (
)
func handle_login(w http.ResponseWriter, r *http.Request, params map[string]any) {
+ var username, password string
+ var user_id int
+ var password_hash string
+ var err error
+ var password_matches bool
+ var cookie_value string
+ var now time.Time
+ var expiry time.Time
+ var cookie http.Cookie
+
if r.Method != "POST" {
render_template(w, "login", params)
return
}
- var user_id int
- username := r.PostFormValue("username")
- password := r.PostFormValue("password")
+ username = r.PostFormValue("username")
+ password = r.PostFormValue("password")
- var password_hash string
- err := database.QueryRow(r.Context(), "SELECT id, COALESCE(password, '') FROM users WHERE username = $1", username).Scan(&user_id, &password_hash)
+ err = database.QueryRow(r.Context(),
+ "SELECT id, COALESCE(password, '') FROM users WHERE username = $1",
+ username,
+ ).Scan(&user_id, &password_hash)
if err != nil {
if errors.Is(err, pgx.ErrNoRows) {
params["login_error"] = "Unknown username"
@@ -42,28 +53,26 @@ func handle_login(w http.ResponseWriter, r *http.Request, params map[string]any)
return
}
- match, err := argon2id.ComparePasswordAndHash(password, password_hash)
- if err != nil {
+ if password_matches, err = argon2id.ComparePasswordAndHash(password, password_hash); err != nil {
http.Error(w, "Error comparing password and hash: "+err.Error(), http.StatusInternalServerError)
return
}
- if !match {
+ if !password_matches {
params["login_error"] = "Invalid password"
render_template(w, "login", params)
return
}
- cookie_value, err := random_urlsafe_string(16)
- if err != nil {
+ if cookie_value, err = random_urlsafe_string(16); err != nil {
http.Error(w, "Error getting random string: "+err.Error(), http.StatusInternalServerError)
return
}
- now := time.Now()
- expiry := now.Add(time.Duration(config.HTTP.CookieExpiry) * time.Second)
+ now = time.Now()
+ expiry = now.Add(time.Duration(config.HTTP.CookieExpiry) * time.Second)
- cookie := http.Cookie{
+ cookie = http.Cookie{
Name: "session",
Value: cookie_value,
SameSite: http.SameSiteLaxMode,