application_controller.rb 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564
  1. # Copyright (C) 2012-2014 Zammad Foundation, http://zammad-foundation.org/
  2. class ApplicationController < ActionController::Base
  3. # http_basic_authenticate_with :name => "test", :password => "ttt"
  4. helper_method :current_user,
  5. :authentication_check,
  6. :config_frontend,
  7. :http_log_config,
  8. :role?,
  9. :model_create_render,
  10. :model_update_render,
  11. :model_restory_render,
  12. :mode_show_rendeder,
  13. :model_index_render
  14. skip_before_action :verify_authenticity_token
  15. before_action :set_user, :session_update
  16. before_action :cors_preflight_check
  17. after_action :user_device_update, :set_access_control_headers
  18. after_action :trigger_events, :http_log
  19. # For all responses in this controller, return the CORS access control headers.
  20. def set_access_control_headers
  21. headers['Access-Control-Allow-Origin'] = '*'
  22. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  23. headers['Access-Control-Max-Age'] = '1728000'
  24. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  25. headers['Access-Control-Allow-Credentials'] = 'true'
  26. end
  27. # If this is a preflight OPTIONS request, then short-circuit the
  28. # request, return only the necessary headers and return an empty
  29. # text/plain.
  30. def cors_preflight_check
  31. return if request.method != 'OPTIONS'
  32. headers['Access-Control-Allow-Origin'] = '*'
  33. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  34. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  35. headers['Access-Control-Max-Age'] = '1728000'
  36. headers['Access-Control-Allow-Credentials'] = 'true'
  37. render text: '', content_type: 'text/plain'
  38. false
  39. end
  40. def http_log_config(config)
  41. @http_log_support = config
  42. end
  43. private
  44. # execute events
  45. def trigger_events
  46. Observer::Transaction.commit
  47. end
  48. # Finds the User with the ID stored in the session with the key
  49. # :current_user_id This is a common way to handle user login in
  50. # a Rails application; logging in sets the session value and
  51. # logging out removes it.
  52. def current_user
  53. return @_current_user if @_current_user
  54. return if !session[:user_id]
  55. @_current_user = User.lookup(id: session[:user_id])
  56. end
  57. def current_user_set(user)
  58. session[:user_id] = user.id
  59. @_current_user = user
  60. set_user
  61. end
  62. # Sets the current user into a named Thread location so that it can be accessed
  63. # by models and observers
  64. def set_user
  65. if !current_user
  66. UserInfo.current_user_id = 1
  67. return
  68. end
  69. UserInfo.current_user_id = current_user.id
  70. end
  71. # update session updated_at
  72. def session_update
  73. #sleep 0.6
  74. session[:ping] = Time.zone.now.iso8601
  75. # check if remote ip need to be updated
  76. if !session[:remote_ip] || session[:remote_ip] != request.remote_ip
  77. session[:remote_ip] = request.remote_ip
  78. session[:geo] = Service::GeoIp.location(request.remote_ip)
  79. end
  80. # fill user agent
  81. return if session[:user_agent]
  82. session[:user_agent] = request.env['HTTP_USER_AGENT']
  83. end
  84. # log http access
  85. def http_log
  86. return if !@http_log_support
  87. # request
  88. request_data = {
  89. content: '',
  90. content_type: request.headers['Content-Type'],
  91. content_encoding: request.headers['Content-Encoding'],
  92. source: request.headers['User-Agent'] || request.headers['Server'],
  93. }
  94. request.headers.each {|key, value|
  95. next if key[0, 5] != 'HTTP_'
  96. request_data[:content] += if key == 'HTTP_COOKIE'
  97. "#{key}: xxxxx\n"
  98. else
  99. "#{key}: #{value}\n"
  100. end
  101. }
  102. body = request.body.read
  103. if body
  104. request_data[:content] += "\n" + body
  105. end
  106. request_data[:content] = request_data[:content].slice(0, 8000)
  107. # response
  108. response_data = {
  109. code: response.status = response.code,
  110. content: '',
  111. content_type: nil,
  112. content_encoding: nil,
  113. source: nil,
  114. }
  115. response.headers.each {|key, value|
  116. response_data[:content] += "#{key}: #{value}\n"
  117. }
  118. body = response.body
  119. if body
  120. response_data[:content] += "\n" + body
  121. end
  122. response_data[:content] = response_data[:content].slice(0, 8000)
  123. record = {
  124. direction: 'in',
  125. facility: @http_log_support[:facility],
  126. url: url_for(only_path: false, overwrite_params: {}),
  127. status: response.status,
  128. ip: request.remote_ip,
  129. request: request_data,
  130. response: response_data,
  131. method: request.method,
  132. }
  133. HttpLog.create(record)
  134. end
  135. # user device recent action update
  136. def user_device_update
  137. # return if we are in switch to user mode
  138. return if session[:switched_from_user_id]
  139. # only if user_id exists
  140. return if !session[:user_id]
  141. # only with user device
  142. if !session[:user_device_id]
  143. if params[:fingerprint]
  144. return false if !user_device_log(current_user, 'session')
  145. end
  146. return
  147. end
  148. # check if entry exists / only if write action
  149. diff = Time.zone.now - 10.minutes
  150. method = request.method
  151. if method == 'GET' || method == 'OPTIONS' || method == 'HEAD'
  152. diff = Time.zone.now - 30.minutes
  153. end
  154. # only update if needed
  155. return if session[:user_device_update_at] && session[:user_device_update_at] > diff
  156. session[:user_device_update_at] = Time.zone.now
  157. user_device = UserDevice.action(
  158. session[:user_device_id],
  159. session[:user_agent],
  160. session[:remote_ip],
  161. session[:user_id],
  162. 'session',
  163. )
  164. # remember if location has changed
  165. return if !user_device
  166. session[:user_device_id] = user_device.id
  167. end
  168. def user_device_log(user, type)
  169. # return if we are in switch to user mode
  170. return true if session[:switched_from_user_id]
  171. # for sessions we need the fingperprint
  172. if !params[:fingerprint] && type == 'session'
  173. render json: { error: 'Need fingerprint param!' }, status: :unprocessable_entity
  174. return false
  175. end
  176. # add device if needed
  177. user_device = UserDevice.add(
  178. request.env['HTTP_USER_AGENT'],
  179. request.remote_ip,
  180. user.id,
  181. params[:fingerprint],
  182. type,
  183. )
  184. session[:user_device_id] = user_device.id
  185. end
  186. def authentication_check_only(auth_param)
  187. #logger.debug 'authentication_check'
  188. #logger.debug params.inspect
  189. #logger.debug session.inspect
  190. #logger.debug cookies.inspect
  191. # already logged in, early exit
  192. if session.id && session[:user_id]
  193. logger.debug 'session based auth check'
  194. userdata = User.lookup(id: session[:user_id])
  195. current_user_set(userdata)
  196. logger.debug "session based auth for '#{userdata.login}'"
  197. return {
  198. auth: true
  199. }
  200. end
  201. error_message = 'authentication failed'
  202. # check sso based authentication
  203. sso_userdata = User.sso(params)
  204. if sso_userdata
  205. if check_maintenance_only(sso_userdata)
  206. return {
  207. auth: false,
  208. message: 'Maintenance mode enabled!',
  209. }
  210. end
  211. session[:persistent] = true
  212. return {
  213. auth: true
  214. }
  215. end
  216. # check http basic based authentication
  217. authenticate_with_http_basic do |username, password|
  218. logger.debug "http basic auth check '#{username}'"
  219. userdata = User.authenticate(username, password)
  220. next if !userdata
  221. if check_maintenance_only(userdata)
  222. return {
  223. auth: false,
  224. message: 'Maintenance mode enabled!',
  225. }
  226. end
  227. current_user_set(userdata)
  228. user_device_log(userdata, 'basic_auth')
  229. logger.debug "http basic auth for '#{userdata.login}'"
  230. return {
  231. auth: true
  232. }
  233. end
  234. # check http token based authentication
  235. if auth_param[:token_action]
  236. authenticate_with_http_token do |token, _options|
  237. logger.debug "token auth check '#{token}'"
  238. userdata = Token.check(
  239. action: auth_param[:token_action],
  240. name: token,
  241. )
  242. next if !userdata
  243. if check_maintenance_only(userdata)
  244. return {
  245. auth: false,
  246. message: 'Maintenance mode enabled!',
  247. }
  248. end
  249. current_user_set(userdata)
  250. user_device_log(userdata, 'token_auth')
  251. logger.debug "token auth for '#{userdata.login}'"
  252. return {
  253. auth: true
  254. }
  255. end
  256. end
  257. logger.debug error_message
  258. {
  259. auth: false,
  260. message: error_message,
  261. }
  262. end
  263. def authentication_check(auth_param = {})
  264. result = authentication_check_only(auth_param)
  265. # check if basic_auth fallback is possible
  266. if auth_param[:basic_auth_promt] && result[:auth] == false
  267. return request_http_basic_authentication
  268. end
  269. # return auth not ok
  270. if result[:auth] == false
  271. render(
  272. json: {
  273. error: result[:message],
  274. },
  275. status: :unauthorized
  276. )
  277. return false
  278. end
  279. # return auth ok
  280. true
  281. end
  282. def role?(role_name)
  283. return false if !current_user
  284. current_user.role?(role_name)
  285. end
  286. def ticket_permission(ticket)
  287. return true if ticket.permission(current_user: current_user)
  288. response_access_deny
  289. false
  290. end
  291. def article_permission(article)
  292. ticket = Ticket.lookup(id: article.ticket_id)
  293. return true if ticket.permission(current_user: current_user)
  294. response_access_deny
  295. false
  296. end
  297. def deny_if_not_role(role_name)
  298. return false if role?(role_name)
  299. response_access_deny
  300. true
  301. end
  302. def valid_session_with_user
  303. return true if current_user
  304. render json: { message: 'No session user!' }, status: :unprocessable_entity
  305. false
  306. end
  307. def response_access_deny
  308. render(
  309. json: {},
  310. status: :unauthorized
  311. )
  312. false
  313. end
  314. def config_frontend
  315. # config
  316. config = {}
  317. Setting.select('name').where(frontend: true).each { |setting|
  318. config[setting.name] = Setting.get(setting.name)
  319. }
  320. # remember if we can to swich back to user
  321. if session[:switched_from_user_id]
  322. config['switch_back_to_possible'] = true
  323. end
  324. # remember session_id for websocket logon
  325. config['session_id'] = session.id
  326. config
  327. end
  328. # model helper
  329. def model_create_render(object, params)
  330. clean_params = object.param_association_lookup(params)
  331. clean_params = object.param_cleanup(clean_params, true)
  332. # create object
  333. generic_object = object.new(clean_params)
  334. # save object
  335. generic_object.save!
  336. # set relations
  337. generic_object.param_set_associations(params)
  338. model_create_render_item(generic_object)
  339. rescue => e
  340. logger.error e.message
  341. logger.error e.backtrace.inspect
  342. render json: model_match_error(e.message), status: :unprocessable_entity
  343. end
  344. def model_create_render_item(generic_object)
  345. render json: generic_object.attributes_with_associations, status: :created
  346. end
  347. def model_update_render(object, params)
  348. # find object
  349. generic_object = object.find(params[:id])
  350. clean_params = object.param_association_lookup(params)
  351. clean_params = object.param_cleanup(clean_params, true)
  352. # save object
  353. generic_object.update_attributes!(clean_params)
  354. # set relations
  355. generic_object.param_set_associations(params)
  356. model_update_render_item(generic_object)
  357. rescue => e
  358. logger.error e.message
  359. logger.error e.backtrace.inspect
  360. render json: model_match_error(e.message), status: :unprocessable_entity
  361. end
  362. def model_update_render_item(generic_object)
  363. render json: generic_object.attributes_with_associations, status: :ok
  364. end
  365. def model_destory_render(object, params)
  366. generic_object = object.find(params[:id])
  367. generic_object.destroy
  368. model_destory_render_item()
  369. rescue => e
  370. logger.error e.message
  371. logger.error e.backtrace.inspect
  372. render json: model_match_error(e.message), status: :unprocessable_entity
  373. end
  374. def model_destory_render_item ()
  375. render json: {}, status: :ok
  376. end
  377. def model_show_render (object, params)
  378. if params[:expand]
  379. generic_object = object.find(params[:id])
  380. model_show_render_item(generic_object)
  381. return
  382. end
  383. if params[:full]
  384. generic_object_full = object.full(params[:id])
  385. render json: generic_object_full, status: :ok
  386. return
  387. end
  388. generic_object = object.find(params[:id])
  389. model_show_render_item(generic_object)
  390. rescue => e
  391. logger.error e.message
  392. logger.error e.backtrace.inspect
  393. render json: model_match_error(e.message), status: :unprocessable_entity
  394. end
  395. def model_show_render_item(generic_object)
  396. render json: generic_object.attributes_with_associations, status: :ok
  397. end
  398. def model_index_render(object, params)
  399. offset = 0
  400. per_page = 1000
  401. if params[:page] && params[:per_page]
  402. offset = (params[:page].to_i - 1) * params[:per_page].to_i
  403. limit = params[:per_page].to_i
  404. end
  405. generic_objects = if offset > 0
  406. object.limit(params[:per_page]).offset(offset).limit(limit)
  407. else
  408. object.all.offset(offset).limit(limit)
  409. end
  410. if params[:full]
  411. assets = {}
  412. item_ids = []
  413. generic_objects.each {|item|
  414. item_ids.push item.id
  415. assets = item.assets(assets)
  416. }
  417. render json: {
  418. record_ids: item_ids,
  419. assets: assets,
  420. }, status: :ok
  421. return
  422. end
  423. generic_objects_with_associations = []
  424. generic_objects.each {|item|
  425. generic_objects_with_associations.push item.attributes_with_associations
  426. }
  427. model_index_render_result(generic_objects_with_associations)
  428. rescue => e
  429. logger.error e.message
  430. logger.error e.backtrace.inspect
  431. render json: model_match_error(e.message), status: :unprocessable_entity
  432. end
  433. def model_index_render_result(generic_objects)
  434. render json: generic_objects, status: :ok
  435. end
  436. def model_match_error(error)
  437. data = {
  438. error: error
  439. }
  440. if error =~ /(already exists|duplicate key|duplicate entry)/i
  441. data[:error_human] = 'Object already exists!'
  442. end
  443. data
  444. end
  445. def model_references_check(object, params)
  446. generic_object = object.find(params[:id])
  447. result = Models.references(object, generic_object.id)
  448. return false if result.empty?
  449. render json: { error: 'Can\'t delete, object has references.' }, status: :unprocessable_entity
  450. true
  451. rescue => e
  452. logger.error e.message
  453. logger.error e.backtrace.inspect
  454. render json: model_match_error(e.message), status: :unprocessable_entity
  455. end
  456. def not_found(e)
  457. respond_to do |format|
  458. format.json { render json: { error: e.message }, status: :not_found }
  459. format.any { render text: "Error: #{e.message}", status: :not_found }
  460. end
  461. end
  462. # check maintenance mode
  463. def check_maintenance_only(user)
  464. return false if Setting.get('maintenance_mode') != true
  465. return false if user.role?('Admin')
  466. Rails.logger.info "Maintenance mode enabled, denied login for user #{user.login}, it's no admin user."
  467. true
  468. end
  469. def check_maintenance(user)
  470. return false if !check_maintenance_only(user)
  471. render json: { error: 'Maintenance mode enabled!' }, status: :unauthorized
  472. true
  473. end
  474. end