NAME
Catalyst::Manual::Tutorial::05_Authentication - Catalyst Tutorial - Chapter 5: Authentication
OVERVIEW
This is Chapter 5 of 10 for the Catalyst tutorial.
05_Authentication
DESCRIPTION
Now that we finally have a simple yet functional application, we can focus on providing authentication (with authorization coming next in Chapter 6).
This chapter of the tutorial is divided into two main sections: 1) basic, cleartext authentication and 2) hash-based authentication.
Source code for the tutorial in included in the /home/catalyst/Final directory of the Tutorial Virtual machine (one subdirectory per chapter). There are also instructions for downloading the code in Catalyst::Manual::Tutorial::01_Intro.
BASIC AUTHENTICATION
This section explores how to add authentication logic to a Catalyst application.
Add Users and Roles to the Database
First, we add both user and role information to the database (we will add the role information here although it will not be used until the authorization section, Chapter 6). Create a new SQL script file by opening myapp02.sql in your editor and insert:
--
-- Add users and role tables, along with a many-to-many join table
--
PRAGMA foreign_keys = ON;
CREATE TABLE users (
id INTEGER PRIMARY KEY,
username TEXT,
password TEXT,
email_address TEXT,
first_name TEXT,
last_name TEXT,
active INTEGER
);
CREATE TABLE role (
id INTEGER PRIMARY KEY,
role TEXT
);
CREATE TABLE user_role (
user_id INTEGER REFERENCES users(id) ON DELETE CASCADE ON UPDATE CASCADE,
role_id INTEGER REFERENCES role(id) ON DELETE CASCADE ON UPDATE CASCADE,
PRIMARY KEY (user_id, role_id)
);
--
-- Load up some initial test data
--
INSERT INTO users VALUES (1, 'test01', 'mypass', 't01@na.com', 'Joe', 'Blow', 1);
INSERT INTO users VALUES (2, 'test02', 'mypass', 't02@na.com', 'Jane', 'Doe', 1);
INSERT INTO users VALUES (3, 'test03', 'mypass', 't03@na.com', 'No', 'Go', 0);
INSERT INTO role VALUES (1, 'user');
INSERT INTO role VALUES (2, 'admin');
INSERT INTO user_role VALUES (1, 1);
INSERT INTO user_role VALUES (1, 2);
INSERT INTO user_role VALUES (2, 1);
INSERT INTO user_role VALUES (3, 1);
Then load this into the myapp.db database with the following command:
$ sqlite3 myapp.db < myapp02.sql
Add User and Role Information to DBIC Schema
Although we could manually edit the DBIC schema information to include the new tables added in the previous step, let's use the create=static
option on the DBIC model helper to do most of the work for us:
$ script/myapp_create.pl model DB DBIC::Schema MyApp::Schema \
create=static components=TimeStamp dbi:SQLite:myapp.db \
on_connect_do="PRAGMA foreign_keys = ON"
exists "/home/catalyst/dev/MyApp/script/../lib/MyApp/Model"
exists "/home/catalyst/dev/MyApp/script/../t"
Dumping manual schema for MyApp::Schema to directory /home/catalyst/dev/MyApp/script/../lib ...
Schema dump completed.
exists "/home/catalyst/dev/MyApp/script/../lib/MyApp/Model/DB.pm"
$
$ ls lib/MyApp/Schema/Result
Author.pm BookAuthor.pm Book.pm Role.pm User.pm UserRole.pm
Notice how the helper has added three new table-specific Result Source files to the lib/MyApp/Schema/Result directory. And, more importantly, even if there were changes to the existing result source files, those changes would have only been written above the # DO NOT MODIFY THIS OR ANYTHING ABOVE!
comment and your hand-edited enhancements would have been preserved.
Speaking of "hand-edited enhancements," we should now add the many_to_many
relationship information to the User Result Source file. As with the Book, BookAuthor, and Author files in Chapter 3, DBIx::Class::Schema::Loader has automatically created the has_many
and belongs_to
relationships for the new User, UserRole, and Role tables. However, as a convenience for mapping Users to their assigned roles (see Chapter 6), we will also manually add a many_to_many
relationship. Edit lib/MyApp/Schema/Result/User.pm add the following information between the # DO NOT MODIFY THIS OR ANYTHING ABOVE!
comment and the closing 1;
:
# many_to_many():
# args:
# 1) Name of relationship, DBIC will create accessor with this name
# 2) Name of has_many() relationship this many_to_many() is shortcut for
# 3) Name of belongs_to() relationship in model class of has_many() above
# You must already have the has_many() defined to use a many_to_many().
__PACKAGE__->many_to_many(roles => 'user_roles', 'role');
The code for this update is obviously very similar to the edits we made to the Book
and Author
classes created in Chapter 3 with one exception: we only defined the many_to_many
relationship in one direction. Whereas we felt that we would want to map Authors to Books AND Books to Authors, here we are only adding the convenience many_to_many
in the Users to Roles direction.
Note that we do not need to make any change to the lib/MyApp/Schema.pm schema file. It simply tells DBIC to load all of the Result Class and ResultSet Class files it finds below the lib/MyApp/Schema directory, so it will automatically pick up our new table information.
Sanity-Check of the Development Server Reload
We aren't ready to try out the authentication just yet; we only want to do a quick check to be sure our model loads correctly. Assuming that you are following along and using the "-r" option on myapp_server.pl, then the development server should automatically reload (if not, press Ctrl-C
to break out of the server if it's running and then enter script/myapp_server.pl to start it). Look for the three new model objects in the startup debug output:
...
.-------------------------------------------------------------------+----------.
| Class | Type |
+-------------------------------------------------------------------+----------+
| MyApp::Controller::Books | instance |
| MyApp::Controller::Root | instance |
| MyApp::Model::DB | instance |
| MyApp::Model::DB::Author | class |
| MyApp::Model::DB::Book | class |
| MyApp::Model::DB::BookAuthor | class |
| MyApp::Model::DB::Role | class |
| MyApp::Model::DB::User | class |
| MyApp::Model::DB::UserRole | class |
| MyApp::View::HTML | instance |
'-------------------------------------------------------------------+----------'
...
Again, notice that your "Result Class" classes have been "re-loaded" by Catalyst under MyApp::Model
.
Include Authentication and Session Plugins
Edit lib/MyApp.pm and update it as follows (everything below StackTrace
is new):
# Load plugins
use Catalyst qw/
-Debug
ConfigLoader
Static::Simple
StackTrace
Authentication
Session
Session::Store::File
Session::State::Cookie
/;
Note: As discussed in Chapter 3, different versions of Catalyst::Devel
have used a variety of methods to load the plugins, but we are going to use the current Catalyst 5.9 practice of putting them on the use Catalyst
line.
The Authentication
plugin supports Authentication while the Session
plugins are required to maintain state across multiple HTTP requests.
Note that the only required Authentication class is the main one. This is a change that occurred in version 0.09999_01 of the Authentication plugin. You do not need to specify a particular Authentication::Store or Authentication::Credential
you want to use. Instead, indicate the Store and Credential you want to use in your application configuration (see below).
Make sure you include the additional plugins as new dependencies in the Makefile.PL file something like this:
requires 'Catalyst::Plugin::Authentication';
requires 'Catalyst::Plugin::Session';
requires 'Catalyst::Plugin::Session::Store::File';
requires 'Catalyst::Plugin::Session::State::Cookie';
Note that there are several options for Session::Store. Session::Store::Memcached is generally a good choice if you are on Unix. If you are running on Windows Session::Store::File is fine. Consult Session::Store and its subclasses for additional information and options (for example to use a database-backed session store).
Configure Authentication
There are a variety of ways to provide configuration information to Catalyst::Plugin::Authentication. Here we will use Catalyst::Authentication::Realm::SimpleDB because it automatically sets a reasonable set of defaults for us. (Note: the SimpleDB
here has nothing to do with the SimpleDB offered in Amazon's web services offerings -- here we are only talking about a "simple" way to use your DB as an authentication backend.) Open lib/MyApp.pm and place the following text above the call to __PACKAGE__->setup();
:
# Configure SimpleDB Authentication
__PACKAGE__->config(
'Plugin::Authentication' => {
default => {
class => 'SimpleDB',
user_model => 'DB::User',
password_type => 'clear',
},
},
);
We could have placed this configuration in myapp.conf, but placing it in lib/MyApp.pm is probably a better place since it's not likely something that users of your application will want to change during deployment (or you could use a mixture: leave class
and user_model
defined in lib/MyApp.pm as we show above, but place password_type
in myapp.conf to allow the type of password to be easily modified during deployment). We will stick with putting all of the authentication-related configuration in lib/MyApp.pm for the tutorial, but if you wish to use myapp.conf, just convert to the following code:
<Plugin::Authentication>
<default>
password_type clear
user_model DB::User
class SimpleDB
</default>
</Plugin::Authentication>
TIP: Here is a short script that will dump the contents of MyApp->config
to Config::General format in myapp.conf:
$ CATALYST_DEBUG=0 perl -Ilib -e 'use MyApp; use Config::General;
Config::General->new->save_file("myapp.conf", MyApp->config);'
HOWEVER, if you try out the command above, be sure to delete the "myapp.conf" command. Otherwise, you will wind up with duplicate configurations.
NOTE: Because we are using SimpleDB along with a database layout that complies with its default assumptions: we don't need to specify the names of the columns where our username and password information is stored (hence, the "Simple" part of "SimpleDB"). That being said, SimpleDB lets you specify that type of information if you need to. Take a look at Catalyst::Authentication::Realm::SimpleDB
for details.
Add Login and Logout Controllers
Use the Catalyst create script to create two stub controller files:
$ script/myapp_create.pl controller Login
$ script/myapp_create.pl controller Logout
You could easily use a single controller here. For example, you could have a User
controller with both login
and logout
actions. Remember, Catalyst is designed to be very flexible, and leaves such matters up to you, the designer and programmer.
Then open lib/MyApp/Controller/Login.pm, and update the definition of sub index
to match:
=head2 index
Login logic
=cut
sub index :Path :Args(0) {
my ($self, $c) = @_;
# Get the username and password from form
my $username = $c->request->params->{username};
my $password = $c->request->params->{password};
# If the username and password values were found in form
if ($username && $password) {
# Attempt to log the user in
if ($c->authenticate({ username => $username,
password => $password } )) {
# If successful, then let them use the application
$c->response->redirect($c->uri_for(
$c->controller('Books')->action_for('list')));
return;
} else {
# Set an error message
$c->stash(error_msg => "Bad username or password.");
}
} else {
# Set an error message
$c->stash(error_msg => "Empty username or password.")
unless ($c->user_exists);
}
# If either of above don't work out, send to the login page
$c->stash(template => 'login.tt2');
}
This controller fetches the username
and password
values from the login form and attempts to authenticate the user. If successful, it redirects the user to the book list page. If the login fails, the user will stay at the login page and receive an error message. If the username
and password
values are not present in the form, the user will be taken to the empty login form.
Note that we could have used something like "sub default :Path
", however, it is generally recommended (partly for historical reasons, and partly for code clarity) only to use default
in MyApp::Controller::Root
, and then mainly to generate the 404 not found page for the application.
Instead, we are using "sub somename :Path :Args(0) {...}
" here to specifically match the URL /login
. Path
actions (aka, "literal actions") create URI matches relative to the namespace of the controller where they are defined. Although Path
supports arguments that allow relative and absolute paths to be defined, here we use an empty Path
definition to match on just the name of the controller itself. The method name, index
, is arbitrary. We make the match even more specific with the :Args(0)
action modifier -- this forces the match on only /login
, not /login/somethingelse
.
Next, update the corresponding method in lib/MyApp/Controller/Logout.pm to match:
=head2 index
Logout logic
=cut
sub index :Path :Args(0) {
my ($self, $c) = @_;
# Clear the user's state
$c->logout;
# Send the user to the starting point
$c->response->redirect($c->uri_for('/'));
}
Add a Login Form TT Template Page
Create a login form by opening root/src/login.tt2 and inserting:
[% META title = 'Login' %]
<!-- Login form -->
<form method="post" action="[% c.uri_for('/login') %]">
<table>
<tr>
<td>Username:</td>
<td><input type="text" name="username" size="40" /></td>
</tr>
<tr>
<td>Password:</td>
<td><input type="password" name="password" size="40" /></td>
</tr>
<tr>
<td colspan="2"><input type="submit" name="submit" value="Submit" /></td>
</tr>
</table>
</form>
Add Valid User Check
We need something that provides enforcement for the authentication mechanism -- a global mechanism that prevents users who have not passed authentication from reaching any pages except the login page. This is generally done via an auto
action/method in lib/MyApp/Controller/Root.pm.
Edit the existing lib/MyApp/Controller/Root.pm class file and insert the following method:
=head2 auto
Check if there is a user and, if not, forward to login page
=cut
# Note that 'auto' runs after 'begin' but before your actions and that
# 'auto's "chain" (all from application path to most specific class are run)
# See the 'Actions' section of 'Catalyst::Manual::Intro' for more info.
sub auto :Private {
my ($self, $c) = @_;
# Allow unauthenticated users to reach the login page. This
# allows unauthenticated users to reach any action in the Login
# controller. To lock it down to a single action, we could use:
# if ($c->action eq $c->controller('Login')->action_for('index'))
# to only allow unauthenticated access to the 'index' action we
# added above.
if ($c->controller eq $c->controller('Login')) {
return 1;
}
# If a user doesn't exist, force login
if (!$c->user_exists) {
# Dump a log message to the development server debug output
$c->log->debug('***Root::auto User not found, forwarding to /login');
# Redirect the user to the login page
$c->response->redirect($c->uri_for('/login'));
# Return 0 to cancel 'post-auto' processing and prevent use of application
return 0;
}
# User found, so return 1 to continue with processing after this 'auto'
return 1;
}
As discussed in "CREATE A CATALYST CONTROLLER" in Catalyst::Manual::Tutorial::03_MoreCatalystBasics, every auto
method from the application/root controller down to the most specific controller will be called. By placing the authentication enforcement code inside the auto
method of lib/MyApp/Controller/Root.pm (or lib/MyApp.pm), it will be called for every request that is received by the entire application.
Displaying Content Only to Authenticated Users
Let's say you want to provide some information on the login page that changes depending on whether the user has authenticated yet. To do this, open root/src/login.tt2 in your editor and add the following lines to the bottom of the file:
...
<p>
[%
# This code illustrates how certain parts of the TT
# template will only be shown to users who have logged in
%]
[% IF c.user_exists %]
Please Note: You are already logged in as '[% c.user.username %]'.
You can <a href="[% c.uri_for('/logout') %]">logout</a> here.
[% ELSE %]
You need to log in to use this application.
[% END %]
[%#
Note that this whole block is a comment because the "#" appears
immediate after the "[%" (with no spaces in between). Although it
can be a handy way to temporarily "comment out" a whole block of
TT code, it's probably a little too subtle for use in "normal"
comments.
%]
</p>
Although most of the code is comments, the middle few lines provide a "you are already logged in" reminder if the user returns to the login page after they have already authenticated. For users who have not yet authenticated, a "You need to log in..." message is displayed (note the use of an IF-THEN-ELSE construct in TT).
Try Out Authentication
The development server should have reloaded each time we edited one of the Controllers in the previous section. Now try going to http://localhost:3000/books/list and you should be redirected to the login page, hitting Shift+Reload or Ctrl+Reload if necessary (the "You are already logged in" message should not appear -- if it does, click the logout
button and try again). Note the ***Root::auto User not found...
debug message in the development server output. Enter username test01
and password mypass
, and you should be taken to the Book List page.
IMPORTANT NOTE: If you are having issues with authentication on Internet Explorer (or potentially other browsers), be sure to check the system clocks on both your server and client machines. Internet Explorer is very picky about timestamps for cookies. You can use the ntpq -p
command on the Tutorial Virtual Machine to check time sync and/or use the following command to force a sync:
sudo ntpdate-debian
Or, depending on your firewall configuration, try it with "-u":
sudo ntpdate-debian -u
Note: NTP can be a little more finicky about firewalls because it uses UDP vs. the more common TCP that you see with most Internet protocols. Worse case, you might have to manually set the time on your development box instead of using NTP.
Open root/src/books/list.tt2 and add the following lines to the bottom (below the closing </table> tag):
...
<p>
<a href="[% c.uri_for('/login') %]">Login</a>
<a href="[% c.uri_for(c.controller.action_for('form_create')) %]">Create</a>
</p>
Reload your browser and you should now see a "Login" and "Create" links at the bottom of the page (as mentioned earlier, you can update template files without a development server reload). Click the first link to return to the login page. This time you should see the "You are already logged in" message.
Finally, click the You can logout here
link on the /login
page. You should stay at the login page, but the message should change to "You need to log in to use this application."
USING PASSWORD HASHES
In this section we increase the security of our system by converting from cleartext passwords to SHA-1 password hashes that include a random "salt" value to make them extremely difficult to crack, even with dictionary and "rainbow table" attacks.
Note: This section is optional. You can skip it and the rest of the tutorial will function normally.
Be aware that even with the techniques shown in this section, the browser still transmits the passwords in cleartext to your application. We are just avoiding the storage of cleartext passwords in the database by using a salted SHA-1 hash. If you are concerned about cleartext passwords between the browser and your application, consider using SSL/TLS, made easy with modules such as Catalyst::Plugin::RequireSSL and Catalyst::ActionRole::RequireSSL.
Re-Run the DBIC::Schema Model Helper to Include DBIx::Class::PassphraseColumn
Let's re-run the model helper to have it include DBIx::Class::PassphraseColumn in all of the Result Classes it generates for us. Simply use the same command we saw in Chapters 3 and 4, but add ,PassphraseColumn
to the components
argument:
$ script/myapp_create.pl model DB DBIC::Schema MyApp::Schema \
create=static components=TimeStamp,PassphraseColumn dbi:SQLite:myapp.db \
on_connect_do="PRAGMA foreign_keys = ON"
If you then open one of the Result Classes, you will see that it includes PassphraseColumn in the load_components
line. Take a look at lib/MyApp/Schema/Result/User.pm since that's the main class where we want to use hashed and salted passwords:
__PACKAGE__->load_components("InflateColumn::DateTime", "TimeStamp", "PassphraseColumn");
Modify the "password" Column to Use PassphraseColumn
Open the file lib/MyApp/Schema/Result/User.pm and enter the following text below the "# DO NOT MODIFY THIS OR ANYTHING ABOVE!" line but above the closing "1;":
# Have the 'password' column use a SHA-1 hash and 20-byte salt
# with RFC 2307 encoding; Generate the 'check_password" method
__PACKAGE__->add_columns(
'password' => {
passphrase => 'rfc2307',
passphrase_class => 'SaltedDigest',
passphrase_args => {
algorithm => 'SHA-1',
salt_random => 20,
},
passphrase_check_method => 'check_password',
},
);
This redefines the automatically generated definition for the password fields at the top of the Result Class file to now use PassphraseColumn logic, storing passwords in RFC 2307 format (passphrase
is set to rfc2307
). passphrase_class
can be set to the name of any Authen::Passphrase::*
class, such as SaltedDigest
to use Authen::Passphrase::SaltedDigest, or BlowfishCrypt
to use Authen::Passphrase::BlowfishCrypt. passphrase_args
is then used to customize the passphrase class you selected. Here we specified the digest algorithm to use as SHA-1
and the size of the salt to use, but we could have also specified any other option the selected passphrase class supports.
Load Hashed Passwords in the Database
Next, let's create a quick script to load some hashed and salted passwords into the password
column of our users
table. Open the file set_hashed_passwords.pl in your editor and enter the following text:
#!/usr/bin/perl
use strict;
use warnings;
use MyApp::Schema;
my $schema = MyApp::Schema->connect('dbi:SQLite:myapp.db');
my @users = $schema->resultset('User')->all;
foreach my $user (@users) {
$user->password('mypass');
$user->update;
}
PassphraseColumn lets us simply call $user->check_password($password)
to see if the user has supplied the correct password, or, as we show above, call $user->update($new_password)
to update the hashed password stored for this user.
Then run the following command:
$ DBIC_TRACE=1 perl -Ilib set_hashed_passwords.pl
We had to use the -Ilib
argument to tell Perl to look under the lib directory for our MyApp::Schema
model.
The DBIC_TRACE output should show that the update worked:
$ DBIC_TRACE=1 perl -Ilib set_hashed_passwords.pl
SELECT me.id, me.username, me.password, me.email_address,
me.first_name, me.last_name, me.active FROM users me:
UPDATE users SET password = ? WHERE ( id = ? ):
'{SSHA}esgz64CpHMo8pMfgIIszP13ft23z/zio04aCwNdm0wc6MDeloMUH4g==', '1'
UPDATE users SET password = ? WHERE ( id = ? ):
'{SSHA}FpGhpCJus+Ea9ne4ww8404HH+hJKW/fW+bAv1v6FuRUy2G7I2aoTRQ==', '2'
UPDATE users SET password = ? WHERE ( id = ? ):
'{SSHA}ZyGlpiHls8qFBSbHr3r5t/iqcZE602XLMbkSVRRNl6rF8imv1abQVg==', '3'
But we can further confirm our actions by dumping the users table:
$ sqlite3 myapp.db "select * from users"
1|test01|{SSHA}esgz64CpHMo8pMfgIIszP13ft23z/zio04aCwNdm0wc6MDeloMUH4g==|t01@na.com|Joe|Blow|1
2|test02|{SSHA}FpGhpCJus+Ea9ne4ww8404HH+hJKW/fW+bAv1v6FuRUy2G7I2aoTRQ==|t02@na.com|Jane|Doe|1
3|test03|{SSHA}ZyGlpiHls8qFBSbHr3r5t/iqcZE602XLMbkSVRRNl6rF8imv1abQVg==|t03@na.com|No|Go|0
As you can see, the passwords are much harder to steal from the database (not only are the hashes stored, but every hash is different even though the passwords are the same because of the added "salt" value). Also note that this demonstrates how to use a DBIx::Class model outside of your web application -- a very useful feature in many situations.
Enable Hashed and Salted Passwords
Edit lib/MyApp.pm and update the config() section for Plugin::Authentication
it to match the following text (the only change is to the password_type
field):
# Configure SimpleDB Authentication
__PACKAGE__->config(
'Plugin::Authentication' => {
default => {
class => 'SimpleDB',
user_model => 'DB::User',
password_type => 'self_check',
},
},
);
The use of self_check
will cause Catalyst::Plugin::Authentication::Store::DBIx::Class to call the check_password
method we enabled on our password
columns.
Try Out the Hashed Passwords
The development server should restart as soon as your save the lib/MyApp.pm file in the previous section. You should now be able to go to http://localhost:3000/books/list and login as before. When done, click the "logout" link on the login page (or point your browser at http://localhost:3000/logout).
USING THE SESSION FOR FLASH
As discussed in the previous chapter of the tutorial, flash
allows you to set variables in a way that is very similar to stash
, but it will remain set across multiple requests. Once the value is read, it is cleared (unless reset). Although flash
has nothing to do with authentication, it does leverage the same session plugins. Now that those plugins are enabled, let's go back and update the "delete and redirect with query parameters" code seen at the end of the Basic CRUD chapter of the tutorial to take advantage of flash
.
First, open lib/MyApp/Controller/Books.pm and modify sub delete
to match the following (everything after the model search line of code has changed):
=head2 delete
Delete a book
=cut
sub delete :Chained('object') :PathPart('delete') :Args(0) {
my ($self, $c) = @_;
# Use the book object saved by 'object' and delete it along
# with related 'book_authors' entries
$c->stash->{object}->delete;
# Use 'flash' to save information across requests until it's read
$c->flash->{status_msg} = "Book deleted";
# Redirect the user back to the list page
$c->response->redirect($c->uri_for($self->action_for('list')));
}
Next, open root/src/wrapper.tt2 and update the TT code to pull from flash vs. the status_msg
query parameter:
...
<div id="content">
[%# Status and error messages %]
<span class="message">[% status_msg || c.flash.status_msg %]</span>
<span class="error">[% error_msg %]</span>
[%# This is where TT will stick all of your template's contents. -%]
[% content %]
</div><!-- end content -->
...
Although the sample above only shows the content
div, leave the rest of the file intact -- the only change we made to replace "|| c.request.params.status_msg
" with "c.flash.status_msg
" in the <span class="message">
line.
Try Out Flash
Authenticate using the login screen and then point your browser to http://localhost:3000/books/url_create/Test/1/4 to create an extra several books. Click the "Return to list" link and delete one of the "Test" books you just added. The flash
mechanism should retain our "Book deleted" status message across the redirect.
NOTE: While flash
will save information across multiple requests, it does get cleared the first time it is read. In general, this is exactly what you want -- the flash
message will get displayed on the next screen where it's appropriate, but it won't "keep showing up" after that first time (unless you reset it). Please refer to Catalyst::Plugin::Session for additional information.
Note: There is also a flash-to-stash
feature that will automatically load the contents the contents of flash into stash, allowing us to use the more typical c.flash.status_msg
in our TT template in lieu of the more verbose status_msg || c.flash.status_msg
we used above. Consult Catalyst::Plugin::Session for additional information.
Switch To Catalyst::Plugin::StatusMessages
Although the query parameter technique we used in Chapter 4 and the flash
approach we used above will work in most cases, they both have their drawbacks. The query parameters can leave the status message on the screen longer than it should (for example, if the user hits refresh). And flash
can display the wrong message on the wrong screen (flash just shows the message on the next page for that user... if the user has multiple windows or tabs open, then the wrong one can get the status message).
Catalyst::Plugin::StatusMessage is designed to address these shortcomings. It stores the messages in the user's session (so they are available across multiple requests), but ties each status message to a random token. By passing this token across the redirect, we are no longer relying on a potentially ambiguous "next request" like we do with flash. And, because the message is deleted the first time it's displayed, the user can hit refresh and still only see the message a single time (even though the URL may continue to reference the token, it's only displayed the first time). The use of StatusMessage
or a similar mechanism is recommended for all Catalyst applications.
To enable StatusMessage
, first edit lib/MyApp.pm and add StatusMessage
to the list of plugins:
use Catalyst qw/
-Debug
ConfigLoader
Static::Simple
StackTrace
Authentication
Session
Session::Store::File
Session::State::Cookie
StatusMessage
/;
Then edit lib/MyApp/Controller/Books.pm and modify the delete
action to match the following:
sub delete :Chained('object') :PathPart('delete') :Args(0) {
my ($self, $c) = @_;
# Saved the PK id for status_msg below
my $id = $c->stash->{object}->id;
# Use the book object saved by 'object' and delete it along
# with related 'book_authors' entries
$c->stash->{object}->delete;
# Redirect the user back to the list page
$c->response->redirect($c->uri_for($self->action_for('list'),
{mid => $c->set_status_msg("Deleted book $id")}));
}
This uses the set_status_msg
that the plugin added to $c
to save the message under a random token. (If we wanted to save an error message, we could have used set_error_msg
.) Because set_status_msg
and set_error_msg
both return the random token, we can assign that value to the "mid
" query parameter via uri_for
as shown above.
Next, we need to make sure that the list page will load display the message. The easiest way to do this is to take advantage of the chained dispatch we implemented in Chapter 4. Edit lib/MyApp/Controller/Books.pm again and update the base
action to match:
sub base :Chained('/') :PathPart('books') :CaptureArgs(0) {
my ($self, $c) = @_;
# Store the ResultSet in stash so it's available for other methods
$c->stash(resultset => $c->model('DB::Book'));
# Print a message to the debug log
$c->log->debug('*** INSIDE BASE METHOD ***');
# Load status messages
$c->load_status_msgs;
}
That way, anything that chains off base
will automatically get any status or error messages loaded into the stash. Let's convert the list
action to take advantage of this. Modify the method signature for list
from:
sub list :Local {
to:
sub list :Chained('base') :PathPart('list') :Args(0) {
Finally, let's clean up the status/error message code in our wrapper template. Edit root/src/wrapper.tt2 and change the "content" div to match the following:
<div id="content">
[%# Status and error messages %]
<span class="message">[% status_msg %]</span>
<span class="error">[% error_msg %]</span>
[%# This is where TT will stick all of your template's contents. -%]
[% content %]
</div><!-- end content -->
Now go to http://localhost:3000/books/list in your browser. Delete another of the "Test" books you added in the previous step. You should get redirection from the delete
action back to the list
action, but with a "mid=########" message ID query parameter. The screen should say "Deleted book #" (where # is the PK id of the book you removed). However, if you hit refresh in your browser, the status message is no longer displayed (even though the URL does still contain the message ID token, it is ignored -- thereby keeping the state of our status/error messages in sync with the users actions).
You can jump to the next chapter of the tutorial here: Authorization
AUTHOR
Kennedy Clark, hkclark@gmail.com
Feel free to contact the author for any errors or suggestions, but the best way to report issues is via the CPAN RT Bug system at https://rt.cpan.org/Public/Dist/Display.html?Name=Catalyst-Manual.
Copyright 2006-2011, Kennedy Clark, under the Creative Commons Attribution Share-Alike License Version 3.0 (https://creativecommons.org/licenses/by-sa/3.0/us/).