mirror of
https://github.com/immich-app/immich.git
synced 2025-12-16 17:23:16 +03:00
* feature(mobile, beta, Android): handle remote asset trash/restore events and rescan media - Handle move to trash and restore from trash for remote assets on Android - Trigger MediaScannerConnection to rescan affected media files * feature(mobile, beta, Android): fix rescan * fix imports * fix checking conditions * refactor naming * fix line breaks * refactor code rollback changes in BackgroundServicePlugin * refactor code (use separate TrashService) * refactor code * parallelize restoreFromTrash calls with Future.wait format trash.provider.dart * try to re-format trash.provider.dart * re-format trash.provider.dart * rename TrashService to TrashSyncService to avoid duplicated names revert changes in original trash.provider.dart * refactor code (minor nitpicks) * process restoreFromTrash sequentially instead of Future.wait * group local assets by checksum before moving to trash delete LocalAssetEntity records when moved to trash refactor code * fix format * use checksum for asset restoration refactro code * fix format * sync trash only for backup-selected assets * feat(db): add local_trashed_asset table and integrate with restoration flow - Add new `local_trashed_asset` table to store metadata of trashed assets - Save trashed asset info into `local_trashed_asset` before deletion - Use `local_trashed_asset` as source for asset restoration - Implement file restoration by `mediaId` * resolve merge conflicts * fix index creating on migration * rework trashed assets handling - add new table trashed_local_asset - mirror trashed assets data in trashed_local_asset. - compute checksums for assets trashed out-of-app. - restore assets present in trashed_local_asset and non-trashed in remote_asset. - simplify moving-to-trash logic based on remote_asset events. * resolve merge conflicts use updated approach for calculating checksums * use CurrentPlatform instead _platform fix mocks * revert redundant changes * Include trashed items in getMediaChanges Process trashed items delta during incremental sync * fix merge conflicts * fix format * trashed_local_asset table mirror of local_asset table structure trashed_local_asset<->local_asset transfer data on move to trash or restore refactor code * refactor and format code * refactor TrashedAsset model fix missed data transfering * refactor code remove unused model * fix label * fix merge conflicts * optimize, refactor code remove redundant code and checking getTrashedAssetsForAlbum for iOS tests for hash trashed assets * format code * fix migration fix tests * fix generated file * reuse exist checksums on trash data update handle restoration errors fix import * format code * sync_stream.service depend on repos refactor assets restoration update dependencies in tests * remove trashed asset model remove trash_sync.service refactor DriftTrashedLocalAssetRepository, LocalSyncService * rework fetching trashed assets data on native side optimize handling trashed assets in local sync service refactor code * update NativeSyncApi on iOS side remove unused code * optimize sync trashed assets call in full sync mode refactor code * fix format * remove albumIds from getTrashedAssets params fix upsert in trashed local asset repo refactor code * fix getTrashedAssets params * fix(trash-sync): clean up NativeSyncApiImplBase and correct applyDelta * refactor(trash-sync): optimize performance and fix minor issues * refactor(trash-sync): add missed index * feat(trash-sync): remove sinceLastCheckpoint param from getTrashedAssets * fix(trash-sync): fix target table * fix(trash-sync): remove unused extension * fix(trash-sync): remove unused code * fix(trash-sync): refactor code * fix(trash-sync): reformat file * fix(trash_sync): refactor code * fix(trash_sync): improve moving to trash * refactor(trash_sync): integrate MANAGE_MEDIA permission request into login flow and advanced settings * refactor(trash_sync): add additional checking for experimental trash sync flag and MANAGE_MEDIA permission. * refactor(trash_sync): resolve merge conflicts * refactor(trash_sync): fix format * resolve merge conflicts add await for alert dialog add missed request * refactor(trash_sync): rework MANAGE_MEDIA info widget show rationale text in permission request alert dialog refactor setting getter * fix(trash_sync): restore missing text values * fix(trash_sync): format file * fix(trash_sync): check backup enabled and remove remote asset existence check * fix(trash_sync): remove checking backup enabled test(trash_sync): cover sync-stream trash/restore paths and dedupe mocks * test(trash_sync): cover trash/restore flows for local_sync_service * chore(e2e): restore test-assets submodule pointer --------- Co-authored-by: Peter Ombodi <peter.ombodi@gmail.com> Co-authored-by: Alex <alex.tran1502@gmail.com>
558 lines
21 KiB
Dart
558 lines
21 KiB
Dart
import 'dart:async';
|
|
import 'dart:convert';
|
|
import 'dart:io';
|
|
import 'dart:math';
|
|
|
|
import 'package:auto_route/auto_route.dart';
|
|
import 'package:crypto/crypto.dart';
|
|
import 'package:easy_localization/easy_localization.dart';
|
|
import 'package:flutter/material.dart';
|
|
import 'package:flutter/services.dart';
|
|
import 'package:flutter_hooks/flutter_hooks.dart' hide Store;
|
|
import 'package:fluttertoast/fluttertoast.dart';
|
|
import 'package:hooks_riverpod/hooks_riverpod.dart';
|
|
import 'package:immich_mobile/domain/models/store.model.dart';
|
|
import 'package:immich_mobile/entities/store.entity.dart';
|
|
import 'package:immich_mobile/extensions/build_context_extensions.dart';
|
|
import 'package:immich_mobile/providers/auth.provider.dart';
|
|
import 'package:immich_mobile/providers/background_sync.provider.dart';
|
|
import 'package:immich_mobile/providers/backup/backup.provider.dart';
|
|
import 'package:immich_mobile/providers/gallery_permission.provider.dart';
|
|
import 'package:immich_mobile/providers/oauth.provider.dart';
|
|
import 'package:immich_mobile/providers/server_info.provider.dart';
|
|
import 'package:immich_mobile/providers/websocket.provider.dart';
|
|
import 'package:immich_mobile/repositories/local_files_manager.repository.dart';
|
|
import 'package:immich_mobile/routing/router.dart';
|
|
import 'package:immich_mobile/utils/provider_utils.dart';
|
|
import 'package:immich_mobile/utils/url_helper.dart';
|
|
import 'package:immich_mobile/utils/version_compatibility.dart';
|
|
import 'package:immich_mobile/widgets/common/immich_logo.dart';
|
|
import 'package:immich_mobile/widgets/common/immich_title_text.dart';
|
|
import 'package:immich_mobile/widgets/common/immich_toast.dart';
|
|
import 'package:immich_mobile/widgets/forms/login/email_input.dart';
|
|
import 'package:immich_mobile/widgets/forms/login/loading_icon.dart';
|
|
import 'package:immich_mobile/widgets/forms/login/login_button.dart';
|
|
import 'package:immich_mobile/widgets/forms/login/o_auth_login_button.dart';
|
|
import 'package:immich_mobile/widgets/forms/login/password_input.dart';
|
|
import 'package:immich_mobile/widgets/forms/login/server_endpoint_input.dart';
|
|
import 'package:logging/logging.dart';
|
|
import 'package:openapi/api.dart';
|
|
import 'package:package_info_plus/package_info_plus.dart';
|
|
import 'package:permission_handler/permission_handler.dart';
|
|
|
|
class LoginForm extends HookConsumerWidget {
|
|
LoginForm({super.key});
|
|
|
|
final log = Logger('LoginForm');
|
|
|
|
@override
|
|
Widget build(BuildContext context, WidgetRef ref) {
|
|
final emailController = useTextEditingController.fromValue(TextEditingValue.empty);
|
|
final passwordController = useTextEditingController.fromValue(TextEditingValue.empty);
|
|
final serverEndpointController = useTextEditingController.fromValue(TextEditingValue.empty);
|
|
final emailFocusNode = useFocusNode();
|
|
final passwordFocusNode = useFocusNode();
|
|
final serverEndpointFocusNode = useFocusNode();
|
|
final isLoading = useState<bool>(false);
|
|
final isLoadingServer = useState<bool>(false);
|
|
final isOauthEnable = useState<bool>(false);
|
|
final isPasswordLoginEnable = useState<bool>(false);
|
|
final oAuthButtonLabel = useState<String>('OAuth');
|
|
final logoAnimationController = useAnimationController(duration: const Duration(seconds: 60))..repeat();
|
|
final serverInfo = ref.watch(serverInfoProvider);
|
|
final warningMessage = useState<String?>(null);
|
|
final loginFormKey = GlobalKey<FormState>();
|
|
final ValueNotifier<String?> serverEndpoint = useState<String?>(null);
|
|
|
|
checkVersionMismatch() async {
|
|
try {
|
|
final packageInfo = await PackageInfo.fromPlatform();
|
|
final appVersion = packageInfo.version;
|
|
final appMajorVersion = int.parse(appVersion.split('.')[0]);
|
|
final appMinorVersion = int.parse(appVersion.split('.')[1]);
|
|
final serverMajorVersion = serverInfo.serverVersion.major;
|
|
final serverMinorVersion = serverInfo.serverVersion.minor;
|
|
|
|
warningMessage.value = getVersionCompatibilityMessage(
|
|
appMajorVersion,
|
|
appMinorVersion,
|
|
serverMajorVersion,
|
|
serverMinorVersion,
|
|
);
|
|
} catch (error) {
|
|
warningMessage.value = 'Error checking version compatibility';
|
|
}
|
|
}
|
|
|
|
/// Fetch the server login credential and enables oAuth login if necessary
|
|
/// Returns true if successful, false otherwise
|
|
Future<void> getServerAuthSettings() async {
|
|
final sanitizeServerUrl = sanitizeUrl(serverEndpointController.text);
|
|
final serverUrl = punycodeEncodeUrl(sanitizeServerUrl);
|
|
|
|
// Guard empty URL
|
|
if (serverUrl.isEmpty) {
|
|
ImmichToast.show(context: context, msg: "login_form_server_empty".tr(), toastType: ToastType.error);
|
|
}
|
|
|
|
try {
|
|
isLoadingServer.value = true;
|
|
final endpoint = await ref.read(authProvider.notifier).validateServerUrl(serverUrl);
|
|
|
|
// Fetch and load server config and features
|
|
await ref.read(serverInfoProvider.notifier).getServerInfo();
|
|
|
|
final serverInfo = ref.read(serverInfoProvider);
|
|
final features = serverInfo.serverFeatures;
|
|
final config = serverInfo.serverConfig;
|
|
|
|
isOauthEnable.value = features.oauthEnabled;
|
|
isPasswordLoginEnable.value = features.passwordLogin;
|
|
oAuthButtonLabel.value = config.oauthButtonText.isNotEmpty ? config.oauthButtonText : 'OAuth';
|
|
|
|
serverEndpoint.value = endpoint;
|
|
} on ApiException catch (e) {
|
|
ImmichToast.show(
|
|
context: context,
|
|
msg: e.message ?? 'login_form_api_exception'.tr(),
|
|
toastType: ToastType.error,
|
|
gravity: ToastGravity.TOP,
|
|
);
|
|
isOauthEnable.value = false;
|
|
isPasswordLoginEnable.value = true;
|
|
isLoadingServer.value = false;
|
|
} on HandshakeException {
|
|
ImmichToast.show(
|
|
context: context,
|
|
msg: 'login_form_handshake_exception'.tr(),
|
|
toastType: ToastType.error,
|
|
gravity: ToastGravity.TOP,
|
|
);
|
|
isOauthEnable.value = false;
|
|
isPasswordLoginEnable.value = true;
|
|
isLoadingServer.value = false;
|
|
} catch (e) {
|
|
ImmichToast.show(
|
|
context: context,
|
|
msg: 'login_form_server_error'.tr(),
|
|
toastType: ToastType.error,
|
|
gravity: ToastGravity.TOP,
|
|
);
|
|
isOauthEnable.value = false;
|
|
isPasswordLoginEnable.value = true;
|
|
isLoadingServer.value = false;
|
|
}
|
|
|
|
isLoadingServer.value = false;
|
|
}
|
|
|
|
useEffect(() {
|
|
final serverUrl = getServerUrl();
|
|
if (serverUrl != null) {
|
|
serverEndpointController.text = serverUrl;
|
|
}
|
|
return null;
|
|
}, []);
|
|
|
|
populateTestLoginInfo() {
|
|
emailController.text = 'demo@immich.app';
|
|
passwordController.text = 'demo';
|
|
serverEndpointController.text = 'https://demo.immich.app';
|
|
}
|
|
|
|
populateTestLoginInfo1() {
|
|
emailController.text = 'testuser@email.com';
|
|
passwordController.text = 'password';
|
|
serverEndpointController.text = 'http://10.1.15.216:2283/api';
|
|
}
|
|
|
|
Future<void> handleSyncFlow() async {
|
|
final backgroundManager = ref.read(backgroundSyncProvider);
|
|
|
|
await backgroundManager.syncLocal(full: true);
|
|
await backgroundManager.syncRemote();
|
|
await backgroundManager.hashAssets();
|
|
|
|
if (Store.get(StoreKey.syncAlbums, false)) {
|
|
await backgroundManager.syncLinkedAlbum();
|
|
}
|
|
}
|
|
|
|
getManageMediaPermission() async {
|
|
final hasPermission = await ref.read(localFilesManagerRepositoryProvider).hasManageMediaPermission();
|
|
if (!hasPermission) {
|
|
await showDialog(
|
|
context: context,
|
|
builder: (BuildContext context) {
|
|
return AlertDialog(
|
|
shape: const RoundedRectangleBorder(borderRadius: BorderRadius.all(Radius.circular(10))),
|
|
elevation: 5,
|
|
title: Text(
|
|
'manage_media_access_title',
|
|
style: TextStyle(fontSize: 16, fontWeight: FontWeight.bold, color: context.primaryColor),
|
|
).tr(),
|
|
content: SingleChildScrollView(
|
|
child: ListBody(
|
|
children: [
|
|
const Text('manage_media_access_subtitle', style: TextStyle(fontSize: 14)).tr(),
|
|
const SizedBox(height: 4),
|
|
const Text('manage_media_access_rationale', style: TextStyle(fontSize: 12)).tr(),
|
|
],
|
|
),
|
|
),
|
|
actions: [
|
|
TextButton(
|
|
onPressed: () => Navigator.of(context).pop(),
|
|
child: Text(
|
|
'cancel'.tr(),
|
|
style: TextStyle(fontWeight: FontWeight.w600, color: context.primaryColor),
|
|
),
|
|
),
|
|
TextButton(
|
|
onPressed: () {
|
|
ref.read(localFilesManagerRepositoryProvider).requestManageMediaPermission();
|
|
Navigator.of(context).pop();
|
|
},
|
|
child: Text(
|
|
'manage_media_access_settings'.tr(),
|
|
style: TextStyle(fontWeight: FontWeight.w600, color: context.primaryColor),
|
|
),
|
|
),
|
|
],
|
|
);
|
|
},
|
|
);
|
|
}
|
|
}
|
|
|
|
bool isSyncRemoteDeletionsMode() => Platform.isAndroid && Store.get(StoreKey.manageLocalMediaAndroid, false);
|
|
|
|
login() async {
|
|
TextInput.finishAutofillContext();
|
|
|
|
isLoading.value = true;
|
|
|
|
// Invalidate all api repository provider instance to take into account new access token
|
|
invalidateAllApiRepositoryProviders(ref);
|
|
|
|
try {
|
|
final result = await ref.read(authProvider.notifier).login(emailController.text, passwordController.text);
|
|
|
|
if (result.shouldChangePassword && !result.isAdmin) {
|
|
unawaited(context.pushRoute(const ChangePasswordRoute()));
|
|
} else {
|
|
final isBeta = Store.isBetaTimelineEnabled;
|
|
if (isBeta) {
|
|
await ref.read(galleryPermissionNotifier.notifier).requestGalleryPermission();
|
|
if (isSyncRemoteDeletionsMode()) {
|
|
await getManageMediaPermission();
|
|
}
|
|
unawaited(handleSyncFlow());
|
|
ref.read(websocketProvider.notifier).connect();
|
|
unawaited(context.replaceRoute(const TabShellRoute()));
|
|
return;
|
|
}
|
|
unawaited(context.replaceRoute(const TabControllerRoute()));
|
|
}
|
|
} catch (error) {
|
|
ImmichToast.show(
|
|
context: context,
|
|
msg: "login_form_failed_login".tr(),
|
|
toastType: ToastType.error,
|
|
gravity: ToastGravity.TOP,
|
|
);
|
|
} finally {
|
|
isLoading.value = false;
|
|
}
|
|
}
|
|
|
|
String generateRandomString(int length) {
|
|
const chars = 'AaBbCcDdEeFfGgHhIiJjKkLlMmNnOoPpQqRrSsTtUuVvWwXxYyZz1234567890';
|
|
final random = Random.secure();
|
|
return String.fromCharCodes(Iterable.generate(length, (_) => chars.codeUnitAt(random.nextInt(chars.length))));
|
|
}
|
|
|
|
List<int> randomBytes(int length) {
|
|
final random = Random.secure();
|
|
return List<int>.generate(length, (i) => random.nextInt(256));
|
|
}
|
|
|
|
/// Per specification, the code verifier must be 43-128 characters long
|
|
/// and consist of characters [A-Z, a-z, 0-9, "-", ".", "_", "~"]
|
|
/// https://datatracker.ietf.org/doc/html/rfc7636#section-4.1
|
|
String randomCodeVerifier() {
|
|
return base64Url.encode(randomBytes(42));
|
|
}
|
|
|
|
Future<String> generatePKCECodeChallenge(String codeVerifier) async {
|
|
var bytes = utf8.encode(codeVerifier);
|
|
var digest = sha256.convert(bytes);
|
|
return base64Url.encode(digest.bytes).replaceAll('=', '');
|
|
}
|
|
|
|
oAuthLogin() async {
|
|
var oAuthService = ref.watch(oAuthServiceProvider);
|
|
String? oAuthServerUrl;
|
|
|
|
final state = generateRandomString(32);
|
|
|
|
final codeVerifier = randomCodeVerifier();
|
|
final codeChallenge = await generatePKCECodeChallenge(codeVerifier);
|
|
|
|
try {
|
|
oAuthServerUrl = await oAuthService.getOAuthServerUrl(
|
|
sanitizeUrl(serverEndpointController.text),
|
|
state,
|
|
codeChallenge,
|
|
);
|
|
|
|
isLoading.value = true;
|
|
|
|
// Invalidate all api repository provider instance to take into account new access token
|
|
invalidateAllApiRepositoryProviders(ref);
|
|
} catch (error, stack) {
|
|
log.severe('Error getting OAuth server Url: $error', stack);
|
|
|
|
ImmichToast.show(
|
|
context: context,
|
|
msg: "login_form_failed_get_oauth_server_config".tr(),
|
|
toastType: ToastType.error,
|
|
gravity: ToastGravity.TOP,
|
|
);
|
|
isLoading.value = false;
|
|
return;
|
|
}
|
|
|
|
if (oAuthServerUrl != null) {
|
|
try {
|
|
final loginResponseDto = await oAuthService.oAuthLogin(oAuthServerUrl, state, codeVerifier);
|
|
|
|
if (loginResponseDto == null) {
|
|
return;
|
|
}
|
|
|
|
log.info("Finished OAuth login with response: ${loginResponseDto.userEmail}");
|
|
|
|
final isSuccess = await ref
|
|
.watch(authProvider.notifier)
|
|
.saveAuthInfo(accessToken: loginResponseDto.accessToken);
|
|
|
|
if (isSuccess) {
|
|
isLoading.value = false;
|
|
final permission = ref.watch(galleryPermissionNotifier);
|
|
final isBeta = Store.isBetaTimelineEnabled;
|
|
if (!isBeta && (permission.isGranted || permission.isLimited)) {
|
|
unawaited(ref.watch(backupProvider.notifier).resumeBackup());
|
|
}
|
|
if (isBeta) {
|
|
await ref.read(galleryPermissionNotifier.notifier).requestGalleryPermission();
|
|
if (isSyncRemoteDeletionsMode()) {
|
|
await getManageMediaPermission();
|
|
}
|
|
unawaited(handleSyncFlow());
|
|
unawaited(context.replaceRoute(const TabShellRoute()));
|
|
return;
|
|
}
|
|
unawaited(context.replaceRoute(const TabControllerRoute()));
|
|
}
|
|
} catch (error, stack) {
|
|
log.severe('Error logging in with OAuth: $error', stack);
|
|
|
|
ImmichToast.show(
|
|
context: context,
|
|
msg: error.toString(),
|
|
toastType: ToastType.error,
|
|
gravity: ToastGravity.TOP,
|
|
);
|
|
} finally {
|
|
isLoading.value = false;
|
|
}
|
|
} else {
|
|
ImmichToast.show(
|
|
context: context,
|
|
msg: "login_form_failed_get_oauth_server_disable".tr(),
|
|
toastType: ToastType.info,
|
|
gravity: ToastGravity.TOP,
|
|
);
|
|
isLoading.value = false;
|
|
return;
|
|
}
|
|
}
|
|
|
|
buildSelectServer() {
|
|
const buttonRadius = 25.0;
|
|
return Column(
|
|
crossAxisAlignment: CrossAxisAlignment.stretch,
|
|
children: [
|
|
ServerEndpointInput(
|
|
controller: serverEndpointController,
|
|
focusNode: serverEndpointFocusNode,
|
|
onSubmit: getServerAuthSettings,
|
|
),
|
|
const SizedBox(height: 18),
|
|
Row(
|
|
children: [
|
|
Expanded(
|
|
child: ElevatedButton.icon(
|
|
style: ElevatedButton.styleFrom(
|
|
padding: const EdgeInsets.symmetric(vertical: 12),
|
|
shape: const RoundedRectangleBorder(
|
|
borderRadius: BorderRadius.only(
|
|
topLeft: Radius.circular(buttonRadius),
|
|
bottomLeft: Radius.circular(buttonRadius),
|
|
),
|
|
),
|
|
),
|
|
onPressed: () => context.pushRoute(const SettingsRoute()),
|
|
icon: const Icon(Icons.settings_rounded),
|
|
label: const Text(""),
|
|
),
|
|
),
|
|
const SizedBox(width: 1),
|
|
Expanded(
|
|
flex: 3,
|
|
child: ElevatedButton.icon(
|
|
style: ElevatedButton.styleFrom(
|
|
padding: const EdgeInsets.symmetric(vertical: 12),
|
|
shape: const RoundedRectangleBorder(
|
|
borderRadius: BorderRadius.only(
|
|
topRight: Radius.circular(buttonRadius),
|
|
bottomRight: Radius.circular(buttonRadius),
|
|
),
|
|
),
|
|
),
|
|
onPressed: isLoadingServer.value ? null : getServerAuthSettings,
|
|
icon: const Icon(Icons.arrow_forward_rounded),
|
|
label: const Text('next', style: TextStyle(fontSize: 14, fontWeight: FontWeight.bold)).tr(),
|
|
),
|
|
),
|
|
],
|
|
),
|
|
const SizedBox(height: 18),
|
|
if (isLoadingServer.value) const LoadingIcon(),
|
|
],
|
|
);
|
|
}
|
|
|
|
buildVersionCompatWarning() {
|
|
checkVersionMismatch();
|
|
|
|
if (warningMessage.value == null) {
|
|
return const SizedBox.shrink();
|
|
}
|
|
|
|
return Padding(
|
|
padding: const EdgeInsets.only(bottom: 8.0),
|
|
child: Container(
|
|
padding: const EdgeInsets.all(16),
|
|
decoration: BoxDecoration(
|
|
color: context.isDarkTheme ? Colors.red.shade700 : Colors.red.shade100,
|
|
borderRadius: const BorderRadius.all(Radius.circular(8)),
|
|
border: Border.all(color: context.isDarkTheme ? Colors.red.shade900 : Colors.red[200]!),
|
|
),
|
|
child: Text(warningMessage.value!, textAlign: TextAlign.center),
|
|
),
|
|
);
|
|
}
|
|
|
|
buildLogin() {
|
|
return AutofillGroup(
|
|
child: Column(
|
|
crossAxisAlignment: CrossAxisAlignment.stretch,
|
|
children: [
|
|
buildVersionCompatWarning(),
|
|
Text(
|
|
sanitizeUrl(serverEndpointController.text),
|
|
style: context.textTheme.displaySmall,
|
|
textAlign: TextAlign.center,
|
|
),
|
|
if (isPasswordLoginEnable.value) ...[
|
|
const SizedBox(height: 18),
|
|
EmailInput(
|
|
controller: emailController,
|
|
focusNode: emailFocusNode,
|
|
onSubmit: passwordFocusNode.requestFocus,
|
|
),
|
|
const SizedBox(height: 8),
|
|
PasswordInput(controller: passwordController, focusNode: passwordFocusNode, onSubmit: login),
|
|
],
|
|
|
|
// Note: This used to have an AnimatedSwitcher, but was removed
|
|
// because of https://github.com/flutter/flutter/issues/120874
|
|
isLoading.value
|
|
? const LoadingIcon()
|
|
: Column(
|
|
crossAxisAlignment: CrossAxisAlignment.stretch,
|
|
mainAxisAlignment: MainAxisAlignment.center,
|
|
children: [
|
|
const SizedBox(height: 18),
|
|
if (isPasswordLoginEnable.value) LoginButton(onPressed: login),
|
|
if (isOauthEnable.value) ...[
|
|
if (isPasswordLoginEnable.value)
|
|
Padding(
|
|
padding: const EdgeInsets.symmetric(horizontal: 16.0),
|
|
child: Divider(color: context.isDarkTheme ? Colors.white : Colors.black),
|
|
),
|
|
OAuthLoginButton(
|
|
serverEndpointController: serverEndpointController,
|
|
buttonLabel: oAuthButtonLabel.value,
|
|
isLoading: isLoading,
|
|
onPressed: oAuthLogin,
|
|
),
|
|
],
|
|
],
|
|
),
|
|
if (!isOauthEnable.value && !isPasswordLoginEnable.value) Center(child: const Text('login_disabled').tr()),
|
|
const SizedBox(height: 12),
|
|
TextButton.icon(
|
|
icon: const Icon(Icons.arrow_back),
|
|
onPressed: () => serverEndpoint.value = null,
|
|
label: const Text('back').tr(),
|
|
),
|
|
],
|
|
),
|
|
);
|
|
}
|
|
|
|
final serverSelectionOrLogin = serverEndpoint.value == null ? buildSelectServer() : buildLogin();
|
|
|
|
return LayoutBuilder(
|
|
builder: (context, constraints) {
|
|
return SingleChildScrollView(
|
|
child: Center(
|
|
child: Container(
|
|
constraints: const BoxConstraints(maxWidth: 300),
|
|
child: Column(
|
|
crossAxisAlignment: CrossAxisAlignment.stretch,
|
|
mainAxisAlignment: MainAxisAlignment.center,
|
|
children: [
|
|
SizedBox(height: constraints.maxHeight / 5),
|
|
Column(
|
|
crossAxisAlignment: CrossAxisAlignment.center,
|
|
mainAxisAlignment: MainAxisAlignment.end,
|
|
children: [
|
|
GestureDetector(
|
|
onDoubleTap: () => populateTestLoginInfo(),
|
|
onLongPress: () => populateTestLoginInfo1(),
|
|
child: RotationTransition(
|
|
turns: logoAnimationController,
|
|
child: const ImmichLogo(heroTag: 'logo'),
|
|
),
|
|
),
|
|
const Padding(padding: EdgeInsets.only(top: 8.0, bottom: 16), child: ImmichTitleText()),
|
|
],
|
|
),
|
|
|
|
// Note: This used to have an AnimatedSwitcher, but was removed
|
|
// because of https://github.com/flutter/flutter/issues/120874
|
|
Form(key: loginFormKey, child: serverSelectionOrLogin),
|
|
],
|
|
),
|
|
),
|
|
),
|
|
);
|
|
},
|
|
);
|
|
}
|
|
}
|