application_controller.rb 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641
  1. # Copyright (C) 2012-2014 Zammad Foundation, http://zammad-foundation.org/
  2. require 'exceptions'
  3. class ApplicationController < ActionController::Base
  4. # http_basic_authenticate_with :name => "test", :password => "ttt"
  5. helper_method :current_user,
  6. :authentication_check,
  7. :config_frontend,
  8. :http_log_config,
  9. :model_create_render,
  10. :model_update_render,
  11. :model_restory_render,
  12. :mode_show_rendeder,
  13. :model_index_render
  14. skip_before_action :verify_authenticity_token
  15. before_action :set_interface_handle, :set_user, :session_update, :user_device_check, :cors_preflight_check
  16. after_action :trigger_events, :http_log, :set_access_control_headers
  17. rescue_from StandardError, with: :server_error
  18. rescue_from ExecJS::RuntimeError, with: :server_error
  19. rescue_from ActiveRecord::RecordNotFound, with: :not_found
  20. rescue_from ArgumentError, with: :unprocessable_entity
  21. rescue_from Exceptions::UnprocessableEntity, with: :unprocessable_entity
  22. rescue_from Exceptions::NotAuthorized, with: :unauthorized
  23. # For all responses in this controller, return the CORS access control headers.
  24. def set_access_control_headers
  25. headers['Access-Control-Allow-Origin'] = '*'
  26. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  27. headers['Access-Control-Max-Age'] = '1728000'
  28. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  29. headers['Access-Control-Allow-Credentials'] = 'true'
  30. end
  31. # If this is a preflight OPTIONS request, then short-circuit the
  32. # request, return only the necessary headers and return an empty
  33. # text/plain.
  34. def cors_preflight_check
  35. return if request.method != 'OPTIONS'
  36. headers['Access-Control-Allow-Origin'] = '*'
  37. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  38. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  39. headers['Access-Control-Max-Age'] = '1728000'
  40. headers['Access-Control-Allow-Credentials'] = 'true'
  41. render text: '', content_type: 'text/plain'
  42. false
  43. end
  44. def http_log_config(config)
  45. @http_log_support = config
  46. end
  47. private
  48. def set_interface_handle
  49. ApplicationHandleInfo.current = 'application_server'
  50. end
  51. # execute events
  52. def trigger_events
  53. Observer::Transaction.commit
  54. end
  55. # Finds the User with the ID stored in the session with the key
  56. # :current_user_id This is a common way to handle user login in
  57. # a Rails application; logging in sets the session value and
  58. # logging out removes it.
  59. def current_user
  60. return @_current_user if @_current_user
  61. return if !session[:user_id]
  62. @_current_user = User.lookup(id: session[:user_id])
  63. end
  64. def current_user_set(user)
  65. session[:user_id] = user.id
  66. @_current_user = user
  67. set_user
  68. end
  69. # Sets the current user into a named Thread location so that it can be accessed
  70. # by models and observers
  71. def set_user
  72. if !current_user
  73. UserInfo.current_user_id = 1
  74. return
  75. end
  76. UserInfo.current_user_id = current_user.id
  77. end
  78. # update session updated_at
  79. def session_update
  80. #sleep 0.6
  81. session[:ping] = Time.zone.now.iso8601
  82. # check if remote ip need to be updated
  83. if !session[:remote_ip] || session[:remote_ip] != request.remote_ip
  84. session[:remote_ip] = request.remote_ip
  85. session[:geo] = Service::GeoIp.location(request.remote_ip)
  86. end
  87. # fill user agent
  88. return if session[:user_agent]
  89. session[:user_agent] = request.env['HTTP_USER_AGENT']
  90. end
  91. # log http access
  92. def http_log
  93. return if !@http_log_support
  94. # request
  95. request_data = {
  96. content: '',
  97. content_type: request.headers['Content-Type'],
  98. content_encoding: request.headers['Content-Encoding'],
  99. source: request.headers['User-Agent'] || request.headers['Server'],
  100. }
  101. request.headers.each { |key, value|
  102. next if key[0, 5] != 'HTTP_'
  103. request_data[:content] += if key == 'HTTP_COOKIE'
  104. "#{key}: xxxxx\n"
  105. else
  106. "#{key}: #{value}\n"
  107. end
  108. }
  109. body = request.body.read
  110. if body
  111. request_data[:content] += "\n" + body
  112. end
  113. request_data[:content] = request_data[:content].slice(0, 8000)
  114. # response
  115. response_data = {
  116. code: response.status = response.code,
  117. content: '',
  118. content_type: nil,
  119. content_encoding: nil,
  120. source: nil,
  121. }
  122. response.headers.each { |key, value|
  123. response_data[:content] += "#{key}: #{value}\n"
  124. }
  125. body = response.body
  126. if body
  127. response_data[:content] += "\n" + body
  128. end
  129. response_data[:content] = response_data[:content].slice(0, 8000)
  130. record = {
  131. direction: 'in',
  132. facility: @http_log_support[:facility],
  133. url: url_for(only_path: false, overwrite_params: {}),
  134. status: response.status,
  135. ip: request.remote_ip,
  136. request: request_data,
  137. response: response_data,
  138. method: request.method,
  139. }
  140. HttpLog.create(record)
  141. end
  142. def user_device_check
  143. return false if !user_device_log(current_user, 'session')
  144. true
  145. end
  146. def user_device_log(user, type)
  147. switched_from_user_id = ENV['SWITCHED_FROM_USER_ID'] || session[:switched_from_user_id]
  148. return true if switched_from_user_id
  149. return true if !user
  150. return true if !user.permissions?('user_preferences.device')
  151. time_to_check = true
  152. user_device_updated_at = session[:user_device_updated_at]
  153. if ENV['USER_DEVICE_UPDATED_AT']
  154. user_device_updated_at = Time.zone.parse(ENV['USER_DEVICE_UPDATED_AT'])
  155. end
  156. if user_device_updated_at
  157. # check if entry exists / only if write action
  158. diff = Time.zone.now - 10.minutes
  159. method = request.method
  160. if method == 'GET' || method == 'OPTIONS' || method == 'HEAD'
  161. diff = Time.zone.now - 30.minutes
  162. end
  163. # only update if needed
  164. if user_device_updated_at > diff
  165. time_to_check = false
  166. end
  167. end
  168. # if ip has not changed and ttl in still valid
  169. remote_ip = ENV['TEST_REMOTE_IP'] || request.remote_ip
  170. return true if time_to_check == false && session[:user_device_remote_ip] == remote_ip
  171. session[:user_device_remote_ip] = remote_ip
  172. # for sessions we need the fingperprint
  173. if type == 'session'
  174. if !session[:user_device_updated_at] && !params[:fingerprint] && !session[:user_device_fingerprint]
  175. raise Exceptions::UnprocessableEntity, 'Need fingerprint param!'
  176. end
  177. if params[:fingerprint]
  178. session[:user_device_fingerprint] = params[:fingerprint]
  179. end
  180. end
  181. session[:user_device_updated_at] = Time.zone.now
  182. # add device if needed
  183. http_user_agent = ENV['HTTP_USER_AGENT'] || request.env['HTTP_USER_AGENT']
  184. Delayed::Job.enqueue(
  185. Observer::UserDeviceLogJob.new(
  186. http_user_agent,
  187. remote_ip,
  188. user.id,
  189. session[:user_device_fingerprint],
  190. type,
  191. )
  192. )
  193. end
  194. def authentication_check_only(auth_param)
  195. #logger.debug 'authentication_check'
  196. #logger.debug params.inspect
  197. #logger.debug session.inspect
  198. #logger.debug cookies.inspect
  199. # already logged in, early exit
  200. if session.id && session[:user_id]
  201. logger.debug 'session based auth check'
  202. user = User.lookup(id: session[:user_id])
  203. return authentication_check_prerequesits(user, 'session', auth_param) if user
  204. end
  205. # check sso based authentication
  206. sso_user = User.sso(params)
  207. if sso_user
  208. if authentication_check_prerequesits(sso_user, 'session', auth_param)
  209. session[:persistent] = true
  210. return sso_user
  211. end
  212. end
  213. # check http basic based authentication
  214. authenticate_with_http_basic do |username, password|
  215. request.session_options[:skip] = true # do not send a session cookie
  216. logger.debug "http basic auth check '#{username}'"
  217. if Setting.get('api_password_access') == false
  218. raise Exceptions::NotAuthorized, 'API password access disabled!'
  219. end
  220. user = User.authenticate(username, password)
  221. return authentication_check_prerequesits(user, 'basic_auth', auth_param) if user
  222. end
  223. # check http token based authentication
  224. authenticate_with_http_token do |token, _options|
  225. logger.debug "http token auth check '#{token}'"
  226. request.session_options[:skip] = true # do not send a session cookie
  227. if Setting.get('api_token_access') == false
  228. raise Exceptions::NotAuthorized, 'API token access disabled!'
  229. end
  230. user = Token.check(
  231. action: 'api',
  232. name: token,
  233. inactive_user: true,
  234. )
  235. if user && auth_param[:permission]
  236. user = Token.check(
  237. action: 'api',
  238. name: token,
  239. permission: auth_param[:permission],
  240. inactive_user: true,
  241. )
  242. raise Exceptions::NotAuthorized, 'Not authorized (token)!' if !user
  243. end
  244. @_token_auth = token # remember for permission_check
  245. return authentication_check_prerequesits(user, 'token_auth', auth_param) if user
  246. end
  247. =begin
  248. # check oauth2 token based authentication
  249. token = Doorkeeper::OAuth::Token.from_bearer_authorization(request)
  250. if token
  251. request.session_options[:skip] = true # do not send a session cookie
  252. logger.debug "oauth2 token auth check '#{token}'"
  253. access_token = Doorkeeper::AccessToken.by_token(token)
  254. # check expire
  255. if access_token.expires_in && (access_token.created_at + access_token.expires_in) < Time.zone.now
  256. raise Exceptions::NotAuthorized, 'OAuth2 token is expired!'
  257. end
  258. if access_token.scopes.empty?
  259. raise Exceptions::NotAuthorized, 'OAuth2 scope missing for token!'
  260. end
  261. user = User.find(access_token.resource_owner_id)
  262. return authentication_check_prerequesits(user, 'token_auth', auth_param) if user
  263. end
  264. =end
  265. false
  266. end
  267. def authentication_check_prerequesits(user, auth_type, auth_param)
  268. if check_maintenance_only(user)
  269. raise Exceptions::NotAuthorized, 'Maintenance mode enabled!'
  270. end
  271. if user.active == false
  272. raise Exceptions::NotAuthorized, 'User is inactive!'
  273. end
  274. # check scopes / permission check
  275. if auth_param[:permission] && !user.permissions?(auth_param[:permission])
  276. raise Exceptions::NotAuthorized, 'Not authorized (user)!'
  277. end
  278. current_user_set(user)
  279. user_device_log(user, auth_type)
  280. logger.debug "#{auth_type} for '#{user.login}'"
  281. true
  282. end
  283. def authentication_check(auth_param = {})
  284. user = authentication_check_only(auth_param)
  285. # check if basic_auth fallback is possible
  286. if auth_param[:basic_auth_promt] && !user
  287. return request_http_basic_authentication
  288. end
  289. # return auth not ok
  290. if !user
  291. raise Exceptions::NotAuthorized, 'authentication failed'
  292. end
  293. # return auth ok
  294. true
  295. end
  296. def ticket_permission(ticket)
  297. return true if ticket.permission(current_user: current_user)
  298. raise Exceptions::NotAuthorized
  299. end
  300. def article_permission(article)
  301. ticket = Ticket.lookup(id: article.ticket_id)
  302. return true if ticket.permission(current_user: current_user)
  303. raise Exceptions::NotAuthorized
  304. end
  305. def permission_check(key)
  306. if @_token_auth
  307. user = Token.check(
  308. action: 'api',
  309. name: @_token_auth,
  310. permission: key,
  311. )
  312. return false if user
  313. raise Exceptions::NotAuthorized, 'Not authorized (token)!'
  314. end
  315. return false if current_user && current_user.permissions?(key)
  316. raise Exceptions::NotAuthorized, 'Not authorized (user)!'
  317. end
  318. def valid_session_with_user
  319. return true if current_user
  320. raise Exceptions::UnprocessableEntity, 'No session user!'
  321. end
  322. def response_access_deny
  323. raise Exceptions::NotAuthorized
  324. end
  325. def config_frontend
  326. # config
  327. config = {}
  328. Setting.select('name, preferences').where(frontend: true).each { |setting|
  329. next if setting.preferences[:authentication] == true && !current_user
  330. value = Setting.get(setting.name)
  331. next if !current_user && (value == false || value.nil?)
  332. config[setting.name] = value
  333. }
  334. # remember if we can to swich back to user
  335. if session[:switched_from_user_id]
  336. config['switch_back_to_possible'] = true
  337. end
  338. # remember session_id for websocket logon
  339. if current_user
  340. config['session_id'] = session.id
  341. end
  342. config
  343. end
  344. # model helper
  345. def model_create_render(object, params)
  346. clean_params = object.param_association_lookup(params)
  347. clean_params = object.param_cleanup(clean_params, true)
  348. # create object
  349. generic_object = object.new(clean_params)
  350. # save object
  351. generic_object.save!
  352. # set relations
  353. generic_object.param_set_associations(params)
  354. if params[:expand]
  355. render json: generic_object.attributes_with_relation_names, status: :created
  356. return
  357. end
  358. model_create_render_item(generic_object)
  359. end
  360. def model_create_render_item(generic_object)
  361. render json: generic_object.attributes_with_associations, status: :created
  362. end
  363. def model_update_render(object, params)
  364. # find object
  365. generic_object = object.find(params[:id])
  366. clean_params = object.param_association_lookup(params)
  367. clean_params = object.param_cleanup(clean_params, true)
  368. # save object
  369. generic_object.update_attributes!(clean_params)
  370. # set relations
  371. generic_object.param_set_associations(params)
  372. if params[:expand]
  373. render json: generic_object.attributes_with_relation_names, status: :ok
  374. return
  375. end
  376. model_update_render_item(generic_object)
  377. end
  378. def model_update_render_item(generic_object)
  379. render json: generic_object.attributes_with_associations, status: :ok
  380. end
  381. def model_destory_render(object, params)
  382. generic_object = object.find(params[:id])
  383. generic_object.destroy!
  384. model_destory_render_item()
  385. end
  386. def model_destory_render_item ()
  387. render json: {}, status: :ok
  388. end
  389. def model_show_render(object, params)
  390. if params[:expand]
  391. generic_object = object.find(params[:id])
  392. render json: generic_object.attributes_with_relation_names, status: :ok
  393. return
  394. end
  395. if params[:full]
  396. generic_object_full = object.full(params[:id])
  397. render json: generic_object_full, status: :ok
  398. return
  399. end
  400. generic_object = object.find(params[:id])
  401. model_show_render_item(generic_object)
  402. end
  403. def model_show_render_item(generic_object)
  404. render json: generic_object.attributes_with_associations, status: :ok
  405. end
  406. def model_index_render(object, params)
  407. offset = 0
  408. per_page = 500
  409. if params[:page] && params[:per_page]
  410. offset = (params[:page].to_i - 1) * params[:per_page].to_i
  411. limit = params[:per_page].to_i
  412. end
  413. generic_objects = if offset > 0
  414. object.limit(params[:per_page]).offset(offset).limit(limit)
  415. else
  416. object.all.offset(offset).limit(limit)
  417. end
  418. if params[:expand]
  419. list = []
  420. generic_objects.each { |generic_object|
  421. list.push generic_object.attributes_with_relation_names
  422. }
  423. render json: list, status: :ok
  424. return
  425. end
  426. if params[:full]
  427. assets = {}
  428. item_ids = []
  429. generic_objects.each { |item|
  430. item_ids.push item.id
  431. assets = item.assets(assets)
  432. }
  433. render json: {
  434. record_ids: item_ids,
  435. assets: assets,
  436. }, status: :ok
  437. return
  438. end
  439. generic_objects_with_associations = []
  440. generic_objects.each { |item|
  441. generic_objects_with_associations.push item.attributes_with_associations
  442. }
  443. model_index_render_result(generic_objects_with_associations)
  444. end
  445. def model_index_render_result(generic_objects)
  446. render json: generic_objects, status: :ok
  447. end
  448. def model_match_error(error)
  449. data = {
  450. error: error
  451. }
  452. if error =~ /(already exists|duplicate key|duplicate entry)/i
  453. data[:error_human] = 'Object already exists!'
  454. end
  455. if error =~ /null value in column "(.+?)" violates not-null constraint/i
  456. data[:error_human] = "Attribute '#{$1}' required!"
  457. end
  458. if Rails.env.production? && !data[:error_human].empty?
  459. data[:error] = data[:error_human]
  460. data.delete('error_human')
  461. end
  462. data
  463. end
  464. def model_references_check(object, params)
  465. generic_object = object.find(params[:id])
  466. result = Models.references(object, generic_object.id)
  467. return false if result.empty?
  468. raise Exceptions::UnprocessableEntity, 'Can\'t delete, object has references.'
  469. rescue => e
  470. raise Exceptions::UnprocessableEntity, e
  471. end
  472. def not_found(e)
  473. logger.error e.message
  474. logger.error e.backtrace.inspect
  475. respond_to do |format|
  476. format.json { render json: model_match_error(e.message), status: :not_found }
  477. format.any {
  478. @exception = e
  479. @traceback = !Rails.env.production?
  480. file = File.open(Rails.root.join('public', '404.html'), 'r')
  481. render inline: file.read, status: :not_found
  482. }
  483. end
  484. end
  485. def unprocessable_entity(e)
  486. logger.error e.message
  487. logger.error e.backtrace.inspect
  488. respond_to do |format|
  489. format.json { render json: model_match_error(e.message), status: :unprocessable_entity }
  490. format.any {
  491. @exception = e
  492. @traceback = !Rails.env.production?
  493. file = File.open(Rails.root.join('public', '422.html'), 'r')
  494. render inline: file.read, status: :unprocessable_entity
  495. }
  496. end
  497. end
  498. def server_error(e)
  499. logger.error e.message
  500. logger.error e.backtrace.inspect
  501. respond_to do |format|
  502. format.json { render json: model_match_error(e.message), status: 500 }
  503. format.any {
  504. @exception = e
  505. @traceback = !Rails.env.production?
  506. file = File.open(Rails.root.join('public', '500.html'), 'r')
  507. render inline: file.read, status: 500
  508. }
  509. end
  510. end
  511. def unauthorized(e)
  512. message = e.message
  513. if message == 'Exceptions::NotAuthorized'
  514. message = 'Not authorized'
  515. end
  516. error = model_match_error(message)
  517. if error && error[:error]
  518. response.headers['X-Failure'] = error[:error_human] || error[:error]
  519. end
  520. respond_to do |format|
  521. format.json { render json: error, status: :unauthorized }
  522. format.any {
  523. @exception = e
  524. @traceback = !Rails.env.production?
  525. file = File.open(Rails.root.join('public', '401.html'), 'r')
  526. render inline: file.read, status: :unauthorized
  527. }
  528. end
  529. end
  530. # check maintenance mode
  531. def check_maintenance_only(user)
  532. return false if Setting.get('maintenance_mode') != true
  533. return false if user.permissions?('admin.maintenance')
  534. Rails.logger.info "Maintenance mode enabled, denied login for user #{user.login}, it's no admin user."
  535. true
  536. end
  537. def check_maintenance(user)
  538. return false if !check_maintenance_only(user)
  539. raise Exceptions::NotAuthorized, 'Maintenance mode enabled!'
  540. end
  541. end