Many hyperlinks are disabled.
Use anonymous login
to enable hyperlinks.
Overview
Comment: | Merge the fix to the login-by-email-address patch. |
---|---|
Downloads: | Tarball | ZIP archive |
Timelines: | family | ancestors | descendants | both | trunk |
Files: | files | file ages | folders |
SHA3-256: |
9b4e157b1e1e51247b285e6773fe510d |
User & Date: | drh 2018-08-12 10:42:50.128 |
Context
2018-08-12
| ||
21:35 | Add /forum link to sitemap if user has RdForum capability ... (check-in: 5ad7222f user: wyoung tags: trunk) | |
10:42 | Merge the fix to the login-by-email-address patch. ... (check-in: 9b4e157b user: drh tags: trunk) | |
06:11 | URL fix in forum.wiki ... (check-in: 542c5576 user: wyoung tags: trunk) | |
2018-08-11
| ||
23:51 | Coding style tweak. ... (Closed-Leaf check-in: 52b9caa5 user: mistachkin tags: login-with-email) | |
Changes
Changes to src/json_login.c.
︙ | |||
122 123 124 125 126 127 128 | 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 | - + - + | } } #if 0 { /* only for debugging the PD()-incorrect-result problem */ cson_object * o = NULL; |
︙ |
Changes to src/login.c.
︙ | |||
204 205 206 207 208 209 210 211 212 213 | 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 | + + + + + + + + - - + + - + - + - + - + - - + + + + + + | } /* ** Searches for the user ID matching the given name and password. ** On success it returns a positive value. On error it returns 0. ** On serious (DB-level) error it will probably exit. ** ** zUsername uses double indirection because we may re-point *zUsername ** at a C string allocated with fossil_strdup() if you pass an email ** address instead and we find that address in the user table's info ** field, which is expected to contain a string of the form "Human Name ** <human@example.com>". In that case, *zUsername will point to that ** user's actual login name on return, causing a leak unless the caller ** is diligent enough to check whether its pointer was re-pointed. ** ** zPassword may be either the plain-text form or the encrypted ** form of the user's password. */ |
︙ | |||
648 649 650 651 652 653 654 | 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 | - + | login_set_anon_cookie(zIpAddr, NULL); record_login_attempt("anonymous", zIpAddr, 1); redirect_to_g(); } if( zUsername!=0 && zPasswd!=0 && zPasswd[0]!=0 ){ /* Attempting to log in as a user other than anonymous. */ |
︙ | |||
949 950 951 952 953 954 955 | 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 | - + | zDecode[i] = 0; zUsername = zDecode; zPasswd = &zDecode[i+1]; /* Attempting to log in as the user provided by HTTP ** basic auth */ |
︙ |
Changes to src/smtp.c.
︙ | |||
1351 1352 1353 1354 1355 1356 1357 | 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 | - - + + - - + - - - + - - - - - - - - - | fflush(stdout); if( pLog ) fprintf(pLog, "S: %s\n", zLine); } /* ** Try to log in for zUser and zPass. ** |
︙ |