mirror of
https://github.com/0rangebananaspy/authelia.git
synced 2024-09-14 22:47:21 +07:00
ce6bf74c8d
This fixes edge cases where the remote IP was not correctly logged. Generally this is not an issue as most errors do not hit this handler, but in instances where a transport error occurs this is important.
48 lines
1.3 KiB
Go
48 lines
1.3 KiB
Go
package handlers
|
|
|
|
import (
|
|
"fmt"
|
|
"net/url"
|
|
|
|
"github.com/authelia/authelia/v4/internal/middlewares"
|
|
"github.com/authelia/authelia/v4/internal/utils"
|
|
)
|
|
|
|
type logoutBody struct {
|
|
TargetURL string `json:"targetURL"`
|
|
}
|
|
|
|
type logoutResponseBody struct {
|
|
SafeTargetURL bool `json:"safeTargetURL"`
|
|
}
|
|
|
|
// LogoutPOST is the handler logging out the user attached to the given cookie.
|
|
func LogoutPOST(ctx *middlewares.AutheliaCtx) {
|
|
body := logoutBody{}
|
|
responseBody := logoutResponseBody{SafeTargetURL: false}
|
|
|
|
err := ctx.ParseBody(&body)
|
|
if err != nil {
|
|
ctx.Error(fmt.Errorf("unable to parse body during logout: %s", err), messageOperationFailed)
|
|
}
|
|
|
|
err = ctx.Providers.SessionProvider.DestroySession(ctx.RequestCtx)
|
|
if err != nil {
|
|
ctx.Error(fmt.Errorf("unable to destroy session during logout: %s", err), messageOperationFailed)
|
|
}
|
|
|
|
redirectionURL, err := url.Parse(body.TargetURL)
|
|
if err == nil {
|
|
responseBody.SafeTargetURL = utils.IsRedirectionSafe(*redirectionURL, ctx.Configuration.Session.Domain)
|
|
}
|
|
|
|
if body.TargetURL != "" {
|
|
ctx.Logger.Debugf("Logout target url is %s, safe %t", body.TargetURL, responseBody.SafeTargetURL)
|
|
}
|
|
|
|
err = ctx.SetJSONBody(responseBody)
|
|
if err != nil {
|
|
ctx.Error(fmt.Errorf("unable to set body during logout: %s", err), messageOperationFailed)
|
|
}
|
|
}
|