Fixing expiration and js warning.

This commit is contained in:
Sergiotarxz 2023-11-09 17:19:46 +01:00
parent 010bd1840d
commit 1b90285833
3 changed files with 89 additions and 83 deletions

View File

@ -59,8 +59,10 @@ document.addEventListener("DOMContentLoaded", function () {
executeAndroidExclusiveCode(Android)
}
searchMobile = document.querySelector('nav.mobile-shortcuts div.search')
fakeSearchInput = searchMobile.querySelector('input')
addListenersSearch()
if (searchMobile !== null) {
fakeSearchInput = searchMobile.querySelector('input')
addListenersSearch()
}
}, false);
function fillFarmaciaGuardia() {

View File

@ -17,16 +17,17 @@ use Crypt::Bcrypt qw/bcrypt bcrypt_check/;
my $tracking;
my $iso8601 = DateTime::Format::ISO8601->new;
my $iso8601 = DateTime::Format::ISO8601->new;
sub request {
shift;
shift;
eval {
my $c = shift;
my $c = shift;
my $app = $c->app;
if (!defined $tracking) {
if ( !defined $tracking ) {
$tracking = BurguillosInfo::Tracking->new($app);
}
$tracking->register_request($c);
$tracking->register_request($c);
};
if ($@) {
say STDERR $@;
@ -34,29 +35,34 @@ sub request {
}
sub stats {
my $self = shift;
if (!$self->valid_login) {
$self->res->headers->location('/stats/login');
$self->render(text => 'You must login', status => 302);
return;
}
my $data = $tracking->get_global_data($self);
my $data_per_url = $tracking->get_data_for_urls($self);
my $google_data = $tracking->get_google_data($self);
$self->_filter_data_per_url($data_per_url);
$self->_filter_data_per_url($google_data);
$self->render(tracking_data => $data, tracking_by_url => $data_per_url, google_data => $google_data);
}
sub _filter_data_per_url($self, $data_per_url) {
my $filter = $self->param('filter');
if (!defined $filter) {
my $self = shift;
if ( !$self->valid_login ) {
$self->res->headers->location('/stats/login');
$self->render( text => 'You must login', status => 302 );
return;
}
my @new_data_per_url;
if ($filter eq 'remove-extensions') {
$self->session( expiration => 0 );
my $data = $tracking->get_global_data($self);
my $data_per_url = $tracking->get_data_for_urls($self);
my $google_data = $tracking->get_google_data($self);
$self->_filter_data_per_url($data_per_url);
$self->_filter_data_per_url($google_data);
$self->render(
tracking_data => $data,
tracking_by_url => $data_per_url,
google_data => $google_data
);
}
sub _filter_data_per_url ( $self, $data_per_url ) {
my $filter = $self->param('filter');
if ( !defined $filter ) {
return;
}
my @new_data_per_url;
if ( $filter eq 'remove-extensions' ) {
for my $url (@$data_per_url) {
if ($url->{path} =~ /\.\w+$/) {
if ( $url->{path} =~ /\.\w+$/ ) {
next;
}
push @new_data_per_url, $url;
@ -66,67 +72,65 @@ sub _filter_data_per_url($self, $data_per_url) {
}
sub submit_login {
my $self = shift;
if ($self->valid_login) {
$self->res->headers->location('/stats');
$self->render(text => 'Already logged in.', status => 302);
return;
}
my $password = $self->param('password');
if (!defined $password) {
$self->render(text => 'No password passed.', status => 400);
return;
}
my $bcrypted_pass = $self->config->{bcrypt_pass_stats};
if (!defined $bcrypted_pass) {
warn "No bcrypt pass.";
$self->render(text => 'Server error.', status => 500);
return;
}
say $password;
say $bcrypted_pass;
if (!bcrypt_check( $password, $bcrypted_pass )) {
$self->render(text => 'Wrong password', status => 401);
return;
}
say STDERR 'Login success.';
my $expiration_date = DateTime->now->add( days => 1);
$self->session->{login} = "date_end_login:$expiration_date";
$self->res->headers->location('/stats');
$self->render(text => 'Login success.', status => 302);
return;
my $self = shift;
if ( $self->valid_login ) {
$self->res->headers->location('/stats');
$self->render( text => 'Already logged in.', status => 302 );
return;
}
my $password = $self->param('password');
if ( !defined $password ) {
$self->render( text => 'No password passed.', status => 400 );
return;
}
my $bcrypted_pass = $self->config->{bcrypt_pass_stats};
if ( !defined $bcrypted_pass ) {
warn "No bcrypt pass.";
$self->render( text => 'Server error.', status => 500 );
return;
}
say $password;
say $bcrypted_pass;
if ( !bcrypt_check( $password, $bcrypted_pass ) ) {
$self->render( text => 'Wrong password', status => 401 );
return;
}
say STDERR 'Login success.';
my $expiration_date = DateTime->now->add( days => 1 );
$self->session->{login} = "date_end_login:$expiration_date";
$self->res->headers->location('/stats');
$self->render( text => 'Login success.', status => 302 );
return;
}
sub valid_login {
my $self = shift;
my $login_cookie = $self->session->{login};
if (!defined $login_cookie) {
return;
}
my $self = shift;
my $login_cookie = $self->session->{login};
if ( !defined $login_cookie ) {
return;
}
my ($date_text) = $login_cookie =~ /^date_end_login:(.*)$/;
my $date;
eval {
$date = $iso8601->parse_datetime($date_text);
};
if ($@) {
warn "Bad date in cookie $login_cookie.";
return;
}
my $current_date = DateTime->now();
if ($current_date > $date) {
return;
}
return 1;
my ($date_text) = $login_cookie =~ /^date_end_login:(.*)$/;
my $date;
eval { $date = $iso8601->parse_datetime($date_text); };
if ($@) {
warn "Bad date in cookie $login_cookie.";
return;
}
my $current_date = DateTime->now();
if ( $current_date > $date ) {
return;
}
return 1;
}
sub login {
my $self = shift;
if ($self->valid_login) {
$self->res->headers->location('/stats');
$self->render(text => 'You are already logged in.', status => 302);
return;
}
$self->render;
my $self = shift;
if ( $self->valid_login ) {
$self->res->headers->location('/stats');
$self->render( text => 'You are already logged in.', status => 302 );
return;
}
$self->render;
}
1;

File diff suppressed because one or more lines are too long