diff options
Diffstat (limited to 'pkg/context/auth.go')
-rw-r--r-- | pkg/context/auth.go | 54 |
1 files changed, 27 insertions, 27 deletions
diff --git a/pkg/context/auth.go b/pkg/context/auth.go index 9ad5cdd0..3ffc9c8f 100644 --- a/pkg/context/auth.go +++ b/pkg/context/auth.go @@ -22,73 +22,73 @@ type ToggleOptions struct { } func Toggle(options *ToggleOptions) macaron.Handler { - return func(ctx *Context) { + return func(c *Context) { // Cannot view any page before installation. if !setting.InstallLock { - ctx.Redirect(setting.AppSubURL + "/install") + c.Redirect(setting.AppSubURL + "/install") return } // Check prohibit login users. - if ctx.IsLogged && ctx.User.ProhibitLogin { - ctx.Data["Title"] = ctx.Tr("auth.prohibit_login") - ctx.HTML(200, "user/auth/prohibit_login") + if c.IsLogged && c.User.ProhibitLogin { + c.Data["Title"] = c.Tr("auth.prohibit_login") + c.HTML(200, "user/auth/prohibit_login") return } // Check non-logged users landing page. - if !ctx.IsLogged && ctx.Req.RequestURI == "/" && setting.LandingPageURL != setting.LANDING_PAGE_HOME { - ctx.Redirect(setting.AppSubURL + string(setting.LandingPageURL)) + if !c.IsLogged && c.Req.RequestURI == "/" && setting.LandingPageURL != setting.LANDING_PAGE_HOME { + c.Redirect(setting.AppSubURL + string(setting.LandingPageURL)) return } // Redirect to dashboard if user tries to visit any non-login page. - if options.SignOutRequired && ctx.IsLogged && ctx.Req.RequestURI != "/" { - ctx.Redirect(setting.AppSubURL + "/") + if options.SignOutRequired && c.IsLogged && c.Req.RequestURI != "/" { + c.Redirect(setting.AppSubURL + "/") return } - if !options.SignOutRequired && !options.DisableCSRF && ctx.Req.Method == "POST" && !auth.IsAPIPath(ctx.Req.URL.Path) { - csrf.Validate(ctx.Context, ctx.csrf) - if ctx.Written() { + if !options.SignOutRequired && !options.DisableCSRF && c.Req.Method == "POST" && !auth.IsAPIPath(c.Req.URL.Path) { + csrf.Validate(c.Context, c.csrf) + if c.Written() { return } } if options.SignInRequired { - if !ctx.IsLogged { + if !c.IsLogged { // Restrict API calls with error message. - if auth.IsAPIPath(ctx.Req.URL.Path) { - ctx.JSON(403, map[string]string{ + if auth.IsAPIPath(c.Req.URL.Path) { + c.JSON(403, map[string]string{ "message": "Only signed in user is allowed to call APIs.", }) return } - ctx.SetCookie("redirect_to", url.QueryEscape(setting.AppSubURL+ctx.Req.RequestURI), 0, setting.AppSubURL) - ctx.Redirect(setting.AppSubURL + "/user/login") + c.SetCookie("redirect_to", url.QueryEscape(setting.AppSubURL+c.Req.RequestURI), 0, setting.AppSubURL) + c.Redirect(setting.AppSubURL + "/user/login") return - } else if !ctx.User.IsActive && setting.Service.RegisterEmailConfirm { - ctx.Data["Title"] = ctx.Tr("auth.active_your_account") - ctx.HTML(200, "user/auth/activate") + } else if !c.User.IsActive && setting.Service.RegisterEmailConfirm { + c.Data["Title"] = c.Tr("auth.active_your_account") + c.HTML(200, "user/auth/activate") return } } // Redirect to log in page if auto-signin info is provided and has not signed in. - if !options.SignOutRequired && !ctx.IsLogged && !auth.IsAPIPath(ctx.Req.URL.Path) && - len(ctx.GetCookie(setting.CookieUserName)) > 0 { - ctx.SetCookie("redirect_to", url.QueryEscape(setting.AppSubURL+ctx.Req.RequestURI), 0, setting.AppSubURL) - ctx.Redirect(setting.AppSubURL + "/user/login") + if !options.SignOutRequired && !c.IsLogged && !auth.IsAPIPath(c.Req.URL.Path) && + len(c.GetCookie(setting.CookieUserName)) > 0 { + c.SetCookie("redirect_to", url.QueryEscape(setting.AppSubURL+c.Req.RequestURI), 0, setting.AppSubURL) + c.Redirect(setting.AppSubURL + "/user/login") return } if options.AdminRequired { - if !ctx.User.IsAdmin { - ctx.Error(403) + if !c.User.IsAdmin { + c.Error(403) return } - ctx.Data["PageIsAdmin"] = true + c.Data["PageIsAdmin"] = true } } } |