标签:authentication login mysql php pdo
我发布了一个问题,寻求帮助来解决我遇到的问题,由于已本地化,因此已关闭.我现在解决了我的问题.
我问的原始问题可以看到PHP Login Script Returning Same user id?.
我的登录脚本有问题.一切似乎都正常,我没有任何错误.
基本上,当我登录时,从数据库中检索到的user_uid(用户uid)始终为3,由于某种原因,它没有获得正确的user_uid,但是存储在会话中的所有其他详细信息都是正确的.
引起问题的查询是这一
$stmt = $dbh->prepare("
SELECT
*
FROM
users, users_roles, users_profiles
WHERE
user_login = :username
OR
user_email = :email
LIMIT 1");
如果我从SQL查询中删除users_roles和users_profiles,而只是从users表中检索,它将获得正确的user_uid,这一定与我要从多个表中检索并且查询在某处混乱有关.
这是我的架构和SQL查询http://sqlfiddle.com/#!2/3cc32/1/0到SqlFiddle的链接
下面是回显的值数组,由于某种原因,即使以测试帐户phplover身份登录时user_uid假定为6,它也显示user_uid’3′(位于表的第一行)似乎在某处发生冲突.
经过进一步测试,似乎它从user表中获得了正确的数据,但user_uid除外,但是它从users_profiles和users_roles中检索了数据库第一行的信息,也许它是从users表中正确获取了user_uid,但是查询可能是覆盖它.
我运行的查询是phpMyAdmin,它仍然执行相同的操作,这绝对与我的SQL查询有关,如何解决我的查询,以便它检索正确的user_uid?
Array
(
[user_uid] => 3 // should be 6, 3 is the user_uid of the first row in database, seems to just fetch first row :/
[user_status] => 1
[user_login] => PhpLover
[user_pass] => 5e79a29e6292e7690a6bf56484140114f1374933081d499b8cc5034685950a16668868cd0886d93f9bc634a5649a6037022a5ef62e9b5d13cda24619bbdf610b;507a7ea891f609.84619944
[user_email] => smaple@sample.com
[user_registered] => 2012-10-14 09:58:16
[user_display_name] =>
[user_failed_logins] => 0
[id] => 3 // not sure where this is coming from but should be 6 like user_uid
[user_role] => subscriber
[user_gender] =>
[user_url] =>
[user_msn] =>
[user_aim] =>
[user_yim] =>
[user_twitter] =>
[user_facebook] =>
)
这是我的登录脚本,因为我将问题范围缩小到了SQL查询,因此无需显示它,但是我认为我会发布它,以防它帮助人们进一步了解正在发生的事情.
<?php
// ob_start()
ob_start();
// Include config.php
require_once("".$_SERVER['DOCUMENT_ROOT']."/de-admin/config.php");
// if user is logged in redirect them to control panel
// an already logged in user cannot login whilst already logged in!
alreadyloggedin();
// top.inc.php
require_once($top_inc);
?>
<!-- Meta start -->
<title><?php echo SITE_NAME; ?> - Member Login</title>
<meta name="description" content="<?php echo SITE_NAME; ?> - Member Login, Sign in" />
<meta name="keywords" content="sign up, member, login, signin, account, membership, <?php echo SITE_NAME; ?>" />
<!-- Meta end -->
<?php
// sidebar.inc.php
require_once($sidebar_inc);
// main.inc.php
require_once($main_inc);
?>
<?php
if(isset($_POST['username_email'], $_POST['password'], $_POST[BOT_TEST], $_POST['token'])){
// check if form token is valid
IsValidFormTokenHash();
// initialize form errors array
$error = array();
// fetch form data
$username_email = trim($_POST['username_email']);
$password = trim($_POST['password']);
$bottest = $_POST[BOT_TEST];
// validate form data
if(empty($username_email)){
$error[] = 'Please enter your username or email address';
}
if(empty($password)){
$error[] = 'Please enter your password';
}
if(!empty($bottest)){
$error[] = 'Spambot detected, if your human please try again';
}
if(!empty($username_email) && !empty($password)){
try{
// connect to database
$dbh = sql_con();
// prepare query
$stmt = $dbh->prepare("
SELECT
*
FROM
users, users_roles, users_profiles
WHERE
users.user_login = :username
OR
users.user_email = :email
AND
users.user_uid = users_roles.user_uid
AND
users.user_uid = users_profiles.user_uid
LIMIT 1");
// execute query
$stmt->execute(array(':username' => $username_email, ':email' => $username_email));
if ($stmt->rowCount() > 0) {
$result = $stmt->fetch(PDO::FETCH_ASSOC);
echo '<pre>';
print_r($result);
echo '</pre>';
$user_db_pass = $result['user_pass'];
if(!ValidatePassword($password, $user_db_pass)){
$error[] = 'Invalid Login Details';
} else {
$user_status = $result['user_status'];
if($user_status == USER_STATUS_VERIFY){
$error[] = 'You must verify your account before you can log in';
}elseif($user_status == USER_STATUS_SUSPENDED){
$error[] = 'This account has been suspended';
}elseif($user_status == USER_STATUS_SPAM){
$error[] = 'This account has been marked as potentially spam';
} else {
// user valid
// fetch user details and assign there details to there sessions
$_SESSION['user_uid'] = $result['user_uid'];
$_SESSION['user_status'] = $result['user_status'];
$_SESSION['user_login'] = $result['user_login'];
$_SESSION['user_email'] = $result['user_email'];
$_SESSION['user_registered'] = $result['user_registered'];
$_SESSION['user_display_name'] = $result['user_display_name'];
$_SESSION['user_role'] = $result['user_role'];
$_SESSION['user_gender'] = $result['user_gender'];
$_SESSION['user_url'] = $result['user_url'];
$_SESSION['user_msn'] = $result['user_msn'];
$_SESSION['user_aim'] = $result['user_aim'];
$_SESSION['user_yim'] = $result['user_yim'];
$_SESSION['user_twitter'] = $result['user_twitter'];
$_SESSION['user_facebook'] = $result['user_facebook'];
// unset (destroy) form token
UnsetFormToken();
// On successful login get URI user was on
// so we can redirect them back to URI they was on
/*if(isset($_SESSION['redirect_to'])){
// if session redirect_to is found this means
// they tried to access a membersarea()
// so we get the URI and redirect to the
// secure page they tried accessing before logged in
$redirect_to = $_SESSION['redirect_to'];
// unset the session var
unset($_SESSION['redirect_to']);
// redirect
header("Location: ".SITE_URL."$redirect_to");
exit();
} else {
header("Location: /member/control-panel");
exit();
}*/
// now logged in redirect to control panel
//header("Location: /member/control-panel");
exit;
}
}
} else {
$error[] = 'Incorrect login details';
}
// close database connection
$dbh = null;
}
catch (PDOException $e){
ExceptionErrorHandler($e);
require_once($footer_inc);
exit;
}
}
// If errors found display errors
if(!empty($error)){
$SiteErrorMessages = '';
foreach($error as $msg){
$SiteErrorMessages .= "$msg <br />";
}
}
}
// display error messages
if(isset($SiteErrorMessages)){
SiteErrorMessages();
}
// the below values is to replace placeholders in tpl
$TemplateReplacementValues = array(
'SITE_NAME' => SITE_NAME,
'FORM_TOKEN_HASH' => GenerateFormTokenHash(),
'BOT_TEST' => BotTest()
);
// signup.tpl template location
$tpl = DOCUMENT_ROOT.'inc/tpl/login.tpl';
// load signup template
PageContentTemplate($tpl, $TemplateReplacementValues);
?>
<?php
// footer.inc.php
require_once($footer_inc);
// ob_end-flush
ob_end_flush();
?>
解决方法:
改写这个:
FROM users, users_profiles, users_roles
对此:
FROM users
INNER JOIN users_profiles USING (user_uid)
INNER JOIN users_roles USING (user_uid)
…否则,您的查询会产生CROSS JOIN(至少可以这样说,效率非常低).
如果某些用户记录在users_profiles和users_roles中可能没有对应的记录,则应在此处用LEFT OUTER JOIN替换INNER JOIN(对于这些用户,在返回的行集中,对应的列值将设置为NULL).
标签:authentication,login,mysql,php,pdo 来源: https://codeday.me/bug/20191127/2074547.html
本站声明: 1. iCode9 技术分享网(下文简称本站)提供的所有内容,仅供技术学习、探讨和分享; 2. 关于本站的所有留言、评论、转载及引用,纯属内容发起人的个人观点,与本站观点和立场无关; 3. 关于本站的所有言论和文字,纯属内容发起人的个人观点,与本站观点和立场无关; 4. 本站文章均是网友提供,不完全保证技术分享内容的完整性、准确性、时效性、风险性和版权归属;如您发现该文章侵犯了您的权益,可联系我们第一时间进行删除; 5. 本站为非盈利性的个人网站,所有内容不会用来进行牟利,也不会利用任何形式的广告来间接获益,纯粹是为了广大技术爱好者提供技术内容和技术思想的分享性交流网站。