application_controller.rb 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696
  1. # Copyright (C) 2012-2014 Zammad Foundation, http://zammad-foundation.org/
  2. require 'exceptions'
  3. class ApplicationController < ActionController::Base
  4. # http_basic_authenticate_with :name => "test", :password => "ttt"
  5. helper_method :current_user,
  6. :authentication_check,
  7. :config_frontend,
  8. :http_log_config,
  9. :role?,
  10. :model_create_render,
  11. :model_update_render,
  12. :model_restory_render,
  13. :mode_show_rendeder,
  14. :model_index_render
  15. skip_before_action :verify_authenticity_token
  16. before_action :set_user, :session_update, :user_device_check, :cors_preflight_check
  17. after_action :trigger_events, :http_log, :set_access_control_headers
  18. rescue_from StandardError, with: :server_error
  19. rescue_from ExecJS::RuntimeError, with: :server_error
  20. rescue_from ActiveRecord::RecordNotFound, with: :not_found
  21. rescue_from ArgumentError, with: :unprocessable_entity
  22. rescue_from Exceptions::UnprocessableEntity, with: :unprocessable_entity
  23. rescue_from Exceptions::NotAuthorized, with: :unauthorized
  24. # For all responses in this controller, return the CORS access control headers.
  25. def set_access_control_headers
  26. headers['Access-Control-Allow-Origin'] = '*'
  27. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  28. headers['Access-Control-Max-Age'] = '1728000'
  29. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  30. headers['Access-Control-Allow-Credentials'] = 'true'
  31. end
  32. # If this is a preflight OPTIONS request, then short-circuit the
  33. # request, return only the necessary headers and return an empty
  34. # text/plain.
  35. def cors_preflight_check
  36. return if request.method != 'OPTIONS'
  37. headers['Access-Control-Allow-Origin'] = '*'
  38. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  39. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  40. headers['Access-Control-Max-Age'] = '1728000'
  41. headers['Access-Control-Allow-Credentials'] = 'true'
  42. render text: '', content_type: 'text/plain'
  43. false
  44. end
  45. def http_log_config(config)
  46. @http_log_support = config
  47. end
  48. private
  49. # execute events
  50. def trigger_events
  51. Observer::Transaction.commit
  52. end
  53. # Finds the User with the ID stored in the session with the key
  54. # :current_user_id This is a common way to handle user login in
  55. # a Rails application; logging in sets the session value and
  56. # logging out removes it.
  57. def current_user
  58. return @_current_user if @_current_user
  59. return if !session[:user_id]
  60. @_current_user = User.lookup(id: session[:user_id])
  61. end
  62. def current_user_set(user)
  63. session[:user_id] = user.id
  64. @_current_user = user
  65. set_user
  66. end
  67. # Sets the current user into a named Thread location so that it can be accessed
  68. # by models and observers
  69. def set_user
  70. if !current_user
  71. UserInfo.current_user_id = 1
  72. return
  73. end
  74. UserInfo.current_user_id = current_user.id
  75. end
  76. # update session updated_at
  77. def session_update
  78. #sleep 0.6
  79. session[:ping] = Time.zone.now.iso8601
  80. # check if remote ip need to be updated
  81. if !session[:remote_ip] || session[:remote_ip] != request.remote_ip
  82. session[:remote_ip] = request.remote_ip
  83. session[:geo] = Service::GeoIp.location(request.remote_ip)
  84. end
  85. # fill user agent
  86. return if session[:user_agent]
  87. session[:user_agent] = request.env['HTTP_USER_AGENT']
  88. end
  89. # log http access
  90. def http_log
  91. return if !@http_log_support
  92. # request
  93. request_data = {
  94. content: '',
  95. content_type: request.headers['Content-Type'],
  96. content_encoding: request.headers['Content-Encoding'],
  97. source: request.headers['User-Agent'] || request.headers['Server'],
  98. }
  99. request.headers.each { |key, value|
  100. next if key[0, 5] != 'HTTP_'
  101. request_data[:content] += if key == 'HTTP_COOKIE'
  102. "#{key}: xxxxx\n"
  103. else
  104. "#{key}: #{value}\n"
  105. end
  106. }
  107. body = request.body.read
  108. if body
  109. request_data[:content] += "\n" + body
  110. end
  111. request_data[:content] = request_data[:content].slice(0, 8000)
  112. # response
  113. response_data = {
  114. code: response.status = response.code,
  115. content: '',
  116. content_type: nil,
  117. content_encoding: nil,
  118. source: nil,
  119. }
  120. response.headers.each { |key, value|
  121. response_data[:content] += "#{key}: #{value}\n"
  122. }
  123. body = response.body
  124. if body
  125. response_data[:content] += "\n" + body
  126. end
  127. response_data[:content] = response_data[:content].slice(0, 8000)
  128. record = {
  129. direction: 'in',
  130. facility: @http_log_support[:facility],
  131. url: url_for(only_path: false, overwrite_params: {}),
  132. status: response.status,
  133. ip: request.remote_ip,
  134. request: request_data,
  135. response: response_data,
  136. method: request.method,
  137. }
  138. HttpLog.create(record)
  139. end
  140. def user_device_check
  141. return false if !user_device_log(current_user, 'session')
  142. true
  143. end
  144. def user_device_log(user, type)
  145. switched_from_user_id = ENV['SWITCHED_FROM_USER_ID'] || session[:switched_from_user_id]
  146. return true if switched_from_user_id
  147. return true if !user
  148. time_to_check = true
  149. user_device_updated_at = session[:user_device_updated_at]
  150. if ENV['USER_DEVICE_UPDATED_AT']
  151. user_device_updated_at = Time.zone.parse(ENV['USER_DEVICE_UPDATED_AT'])
  152. end
  153. if user_device_updated_at
  154. # check if entry exists / only if write action
  155. diff = Time.zone.now - 10.minutes
  156. method = request.method
  157. if method == 'GET' || method == 'OPTIONS' || method == 'HEAD'
  158. diff = Time.zone.now - 30.minutes
  159. end
  160. # only update if needed
  161. if user_device_updated_at > diff
  162. time_to_check = false
  163. end
  164. end
  165. # if ip has not changed and ttl in still valid
  166. remote_ip = ENV['TEST_REMOTE_IP'] || request.remote_ip
  167. return true if time_to_check == false && session[:user_device_remote_ip] == remote_ip
  168. session[:user_device_remote_ip] = remote_ip
  169. # for sessions we need the fingperprint
  170. if type == 'session'
  171. if !session[:user_device_updated_at] && !params[:fingerprint] && !session[:user_device_fingerprint]
  172. raise Exceptions::UnprocessableEntity, 'Need fingerprint param!'
  173. end
  174. if params[:fingerprint]
  175. session[:user_device_fingerprint] = params[:fingerprint]
  176. end
  177. end
  178. session[:user_device_updated_at] = Time.zone.now
  179. # add device if needed
  180. http_user_agent = ENV['HTTP_USER_AGENT'] || request.env['HTTP_USER_AGENT']
  181. Delayed::Job.enqueue(
  182. Observer::UserDeviceLogJob.new(
  183. http_user_agent,
  184. remote_ip,
  185. user.id,
  186. session[:user_device_fingerprint],
  187. type,
  188. )
  189. )
  190. end
  191. def authentication_check_only(auth_param)
  192. #logger.debug 'authentication_check'
  193. #logger.debug params.inspect
  194. #logger.debug session.inspect
  195. #logger.debug cookies.inspect
  196. # already logged in, early exit
  197. if session.id && session[:user_id]
  198. logger.debug 'session based auth check'
  199. user = User.lookup(id: session[:user_id])
  200. # check scopes / permission check
  201. # auth_param[:permission]
  202. #if auth_param[:permission] && !user.permission?(auth_param[:permission])
  203. # return {
  204. # auth: false,
  205. # message: 'No permission!',
  206. # }
  207. #end
  208. current_user_set(user)
  209. logger.debug "session based auth for '#{user.login}'"
  210. return {
  211. auth: true
  212. }
  213. end
  214. error_message = 'authentication failed'
  215. # check sso based authentication
  216. sso_user = User.sso(params)
  217. if sso_user
  218. if check_maintenance_only(sso_user)
  219. return {
  220. auth: false,
  221. message: 'Maintenance mode enabled!',
  222. }
  223. end
  224. session[:persistent] = true
  225. return {
  226. auth: true
  227. }
  228. end
  229. # check http basic based authentication
  230. authenticate_with_http_basic do |username, password|
  231. request.session_options[:skip] = true # do not send a session cookie
  232. logger.debug "http basic auth check '#{username}'"
  233. if Setting.get('api_password_access') == false
  234. return {
  235. auth: false,
  236. message: 'API password access disabled!',
  237. }
  238. end
  239. user = User.authenticate(username, password)
  240. next if !user
  241. if check_maintenance_only(user)
  242. return {
  243. auth: false,
  244. message: 'Maintenance mode enabled!',
  245. }
  246. end
  247. current_user_set(user)
  248. user_device_log(user, 'basic_auth')
  249. logger.debug "http basic auth for '#{user.login}'"
  250. return {
  251. auth: true
  252. }
  253. end
  254. # check http token action based authentication
  255. if auth_param[:token_action]
  256. authenticate_with_http_token do |token, _options|
  257. request.session_options[:skip] = true # do not send a session cookie
  258. logger.debug "http token action auth check '#{token}'"
  259. user = Token.check(
  260. action: auth_param[:token_action],
  261. name: token,
  262. )
  263. next if !user
  264. if check_maintenance_only(user)
  265. return {
  266. auth: false,
  267. message: 'Maintenance mode enabled!',
  268. }
  269. end
  270. current_user_set(user)
  271. user_device_log(user, 'token_auth')
  272. logger.debug "http token action auth for '#{user.login}'"
  273. return {
  274. auth: true
  275. }
  276. end
  277. end
  278. # check http token based authentication
  279. authenticate_with_http_token do |token, _options|
  280. logger.debug "http token auth check '#{token}'"
  281. request.session_options[:skip] = true # do not send a session cookie
  282. if Setting.get('api_token_access') == false
  283. return {
  284. auth: false,
  285. message: 'API token access disabled!',
  286. }
  287. end
  288. user = Token.check(
  289. action: 'api',
  290. name: token,
  291. )
  292. next if !user
  293. if check_maintenance_only(user)
  294. return {
  295. auth: false,
  296. message: 'Maintenance mode enabled!',
  297. }
  298. end
  299. # permission check
  300. # auth_param[:permission]
  301. current_user_set(user)
  302. user_device_log(user, 'token_auth')
  303. logger.debug "http token auth for '#{user.login}'"
  304. return {
  305. auth: true
  306. }
  307. end
  308. =begin
  309. # check oauth2 token based authentication
  310. token = Doorkeeper::OAuth::Token.from_bearer_authorization(request)
  311. if token
  312. request.session_options[:skip] = true # do not send a session cookie
  313. logger.debug "oauth2 token auth check '#{token}'"
  314. access_token = Doorkeeper::AccessToken.by_token(token)
  315. # check expire
  316. if access_token.expires_in && (access_token.created_at + access_token.expires_in) < Time.zone.now
  317. return {
  318. auth: false,
  319. message: 'OAuth2 token is expired!',
  320. }
  321. end
  322. user = User.find(access_token.resource_owner_id)
  323. if !user || user.active == false
  324. return {
  325. auth: false,
  326. message: 'OAuth2 resource owner inactive!',
  327. }
  328. end
  329. if check_maintenance_only(user)
  330. return {
  331. auth: false,
  332. message: 'Maintenance mode enabled!',
  333. }
  334. end
  335. # check scopes / permission check
  336. # auth_param[:permission]
  337. if access_token.scopes.empty?
  338. return {
  339. auth: false,
  340. message: 'OAuth2 scope missing for token!',
  341. }
  342. end
  343. current_user_set(user)
  344. user_device_log(user, 'token_auth')
  345. logger.debug "oauth token auth for '#{user.login}'"
  346. return {
  347. auth: true
  348. }
  349. end
  350. =end
  351. logger.debug error_message
  352. {
  353. auth: false,
  354. message: error_message,
  355. }
  356. end
  357. def authentication_check(auth_param = {})
  358. result = authentication_check_only(auth_param)
  359. # check if basic_auth fallback is possible
  360. if auth_param[:basic_auth_promt] && result[:auth] == false
  361. return request_http_basic_authentication
  362. end
  363. # return auth not ok
  364. if result[:auth] == false
  365. raise Exceptions::NotAuthorized, result[:message]
  366. end
  367. # return auth ok
  368. true
  369. end
  370. def role?(role_name)
  371. return false if !current_user
  372. current_user.role?(role_name)
  373. end
  374. def ticket_permission(ticket)
  375. return true if ticket.permission(current_user: current_user)
  376. raise Exceptions::NotAuthorized
  377. end
  378. def article_permission(article)
  379. ticket = Ticket.lookup(id: article.ticket_id)
  380. return true if ticket.permission(current_user: current_user)
  381. raise Exceptions::NotAuthorized
  382. end
  383. def deny_if_not_role(role_name)
  384. return false if role?(role_name)
  385. raise Exceptions::NotAuthorized
  386. end
  387. def valid_session_with_user
  388. return true if current_user
  389. raise Exceptions::UnprocessableEntity, 'No session user!'
  390. end
  391. def response_access_deny
  392. raise Exceptions::NotAuthorized
  393. end
  394. def config_frontend
  395. # config
  396. config = {}
  397. Setting.select('name').where(frontend: true).each { |setting|
  398. config[setting.name] = Setting.get(setting.name)
  399. }
  400. # remember if we can to swich back to user
  401. if session[:switched_from_user_id]
  402. config['switch_back_to_possible'] = true
  403. end
  404. # remember session_id for websocket logon
  405. config['session_id'] = session.id
  406. config
  407. end
  408. # model helper
  409. def model_create_render(object, params)
  410. clean_params = object.param_association_lookup(params)
  411. clean_params = object.param_cleanup(clean_params, true)
  412. # create object
  413. generic_object = object.new(clean_params)
  414. # save object
  415. generic_object.save!
  416. # set relations
  417. generic_object.param_set_associations(params)
  418. if params[:expand]
  419. render json: generic_object.attributes_with_relation_names, status: :created
  420. return
  421. end
  422. model_create_render_item(generic_object)
  423. end
  424. def model_create_render_item(generic_object)
  425. render json: generic_object.attributes_with_associations, status: :created
  426. end
  427. def model_update_render(object, params)
  428. # find object
  429. generic_object = object.find(params[:id])
  430. clean_params = object.param_association_lookup(params)
  431. clean_params = object.param_cleanup(clean_params, true)
  432. # save object
  433. generic_object.update_attributes!(clean_params)
  434. # set relations
  435. generic_object.param_set_associations(params)
  436. if params[:expand]
  437. render json: generic_object.attributes_with_relation_names, status: :ok
  438. return
  439. end
  440. model_update_render_item(generic_object)
  441. end
  442. def model_update_render_item(generic_object)
  443. render json: generic_object.attributes_with_associations, status: :ok
  444. end
  445. def model_destory_render(object, params)
  446. generic_object = object.find(params[:id])
  447. generic_object.destroy!
  448. model_destory_render_item()
  449. end
  450. def model_destory_render_item ()
  451. render json: {}, status: :ok
  452. end
  453. def model_show_render(object, params)
  454. if params[:expand]
  455. generic_object = object.find(params[:id])
  456. render json: generic_object.attributes_with_relation_names, status: :ok
  457. return
  458. end
  459. if params[:full]
  460. generic_object_full = object.full(params[:id])
  461. render json: generic_object_full, status: :ok
  462. return
  463. end
  464. generic_object = object.find(params[:id])
  465. model_show_render_item(generic_object)
  466. end
  467. def model_show_render_item(generic_object)
  468. render json: generic_object.attributes_with_associations, status: :ok
  469. end
  470. def model_index_render(object, params)
  471. offset = 0
  472. per_page = 500
  473. if params[:page] && params[:per_page]
  474. offset = (params[:page].to_i - 1) * params[:per_page].to_i
  475. limit = params[:per_page].to_i
  476. end
  477. generic_objects = if offset > 0
  478. object.limit(params[:per_page]).offset(offset).limit(limit)
  479. else
  480. object.all.offset(offset).limit(limit)
  481. end
  482. if params[:expand]
  483. list = []
  484. generic_objects.each { |generic_object|
  485. list.push generic_object.attributes_with_relation_names
  486. }
  487. render json: list, status: :ok
  488. return
  489. end
  490. if params[:full]
  491. assets = {}
  492. item_ids = []
  493. generic_objects.each { |item|
  494. item_ids.push item.id
  495. assets = item.assets(assets)
  496. }
  497. render json: {
  498. record_ids: item_ids,
  499. assets: assets,
  500. }, status: :ok
  501. return
  502. end
  503. generic_objects_with_associations = []
  504. generic_objects.each { |item|
  505. generic_objects_with_associations.push item.attributes_with_associations
  506. }
  507. model_index_render_result(generic_objects_with_associations)
  508. end
  509. def model_index_render_result(generic_objects)
  510. render json: generic_objects, status: :ok
  511. end
  512. def model_match_error(error)
  513. data = {
  514. error: error
  515. }
  516. if error =~ /(already exists|duplicate key|duplicate entry)/i
  517. data[:error_human] = 'Object already exists!'
  518. end
  519. data
  520. end
  521. def model_references_check(object, params)
  522. generic_object = object.find(params[:id])
  523. result = Models.references(object, generic_object.id)
  524. return false if result.empty?
  525. raise Exceptions::UnprocessableEntity, 'Can\'t delete, object has references.'
  526. rescue => e
  527. raise Exceptions::UnprocessableEntity, e
  528. end
  529. def not_found(e)
  530. logger.error e.message
  531. logger.error e.backtrace.inspect
  532. respond_to do |format|
  533. format.json { render json: model_match_error(e.message), status: :not_found }
  534. format.any {
  535. @exception = e
  536. @traceback = !Rails.env.production?
  537. file = File.open(Rails.root.join('public', '404.html'), 'r')
  538. render inline: file.read, status: :not_found
  539. }
  540. end
  541. end
  542. def unprocessable_entity(e)
  543. logger.error e.message
  544. logger.error e.backtrace.inspect
  545. respond_to do |format|
  546. format.json { render json: model_match_error(e.message), status: :unprocessable_entity }
  547. format.any {
  548. @exception = e
  549. @traceback = !Rails.env.production?
  550. file = File.open(Rails.root.join('public', '422.html'), 'r')
  551. render inline: file.read, status: :unprocessable_entity
  552. }
  553. end
  554. end
  555. def server_error(e)
  556. logger.error e.message
  557. logger.error e.backtrace.inspect
  558. respond_to do |format|
  559. format.json { render json: model_match_error(e.message), status: 500 }
  560. format.any {
  561. @exception = e
  562. @traceback = !Rails.env.production?
  563. file = File.open(Rails.root.join('public', '500.html'), 'r')
  564. render inline: file.read, status: 500
  565. }
  566. end
  567. end
  568. def unauthorized(e)
  569. error = model_match_error(e.message)
  570. if error && error[:error]
  571. response.headers['X-Failure'] = error[:error_human] || error[:error]
  572. end
  573. respond_to do |format|
  574. format.json { render json: error, status: :unauthorized }
  575. format.any {
  576. @exception = e
  577. @traceback = !Rails.env.production?
  578. file = File.open(Rails.root.join('public', '401.html'), 'r')
  579. render inline: file.read, status: :unauthorized
  580. }
  581. end
  582. end
  583. # check maintenance mode
  584. def check_maintenance_only(user)
  585. return false if Setting.get('maintenance_mode') != true
  586. return false if user.role?('Admin')
  587. Rails.logger.info "Maintenance mode enabled, denied login for user #{user.login}, it's no admin user."
  588. true
  589. end
  590. def check_maintenance(user)
  591. return false if !check_maintenance_only(user)
  592. raise Exceptions::NotAuthorized, 'Maintenance mode enabled!'
  593. end
  594. end