Handling AJAX requests with expired authentication
The Problem:
When an ajax request is made from a page that requires a valid user (in the session), the page does not redirect (to a Login page) when the auth session has expired. This makes the page look unresponsive and provides a less than ideal user experience.
The Solution:
The solution is quite simple though not that obvious. It has 2 parts:
The middleware will recognise the expired auth and that the request is ajax, then send a custom
Responsethe page will recognise.The Javascript on the page will check the ajax response before it gets processes by other event handlres. If the response matches the criteria the browser redirects to the login page.
The Code:
Auth Middleware
In your AuthenticationMiddleware
do something similar to the following
def before(self, request, response):
if not request.user():
if request.is_ajax():
response.content = "MASONITE_LOGIN_REQUIRED"
response.status(403)
return response
return response.redirect(name="login")
return requestPage Template
Add the .ajaxComplete() block the document.ready javascript function in your page
$(document).ready(function() {
$(document).ajaxComplete(
function (event, request, options) {
if (request.responseText === "MASONITE_LOGIN_REQUIRED") {
window.location.href = "{{ route(name='login') }}";
}
}
)
});This is for JQuery but you can adjust this id for whatever JS framework you're using.
Middleware ordering
This adjustment is not strictly required but does provide a better user experience.
By default the VerifyCsrfToken middleware is set as part of the web middleware group. This will prevent the auth middleware checking the request before processing the page form data and may generate an invalid form error which is not what the user might expect.
To resolve this you can easily rearrange the order of middlewares.
In your Kernel.py file adjust the route_middleware similar to this:
route_middleware = {
"web": [SessionMiddleware, LoadUserMiddleware],
"auth": [AuthenticationMiddleware, VerifyCsrfToken],
...
}NOTE: the VerifyCsrfToken comes AFTER the AuthenticationMiddleware. This means that in this example only the routes tagged as auth will check the csrf token in form data.
Notes:
The
MASONITE_LOGIN_REQUIREDcan be anything you like, so making it aconstof some kind is probably advisable to prevent issues with typos.The above javascript assumes you have a route named
login
Last updated