sessions_controller.rb 6.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264
  1. # Copyright (C) 2012-2022 Zammad Foundation, https://zammad-foundation.org/
  2. class SessionsController < ApplicationController
  3. prepend_before_action -> { authentication_check && authorize! }, only: %i[switch_to_user list delete]
  4. skip_before_action :verify_csrf_token, only: %i[show destroy create_omniauth failure_omniauth]
  5. skip_before_action :user_device_log, only: %i[create_sso]
  6. # "Create" a login, aka "log the user in"
  7. def create
  8. user = authenticate_with_password
  9. initiate_session_for(user)
  10. # return new session data
  11. render status: :created,
  12. json: SessionHelper.json_hash(user).merge(config: config_frontend)
  13. end
  14. def create_sso
  15. raise Exceptions::Forbidden, 'SSO authentication disabled!' if !Setting.get('auth_sso')
  16. user = begin
  17. login = request.env['REMOTE_USER'] ||
  18. request.env['HTTP_REMOTE_USER'] ||
  19. request.headers['X-Forwarded-User']
  20. User.lookup(login: login&.downcase)
  21. end
  22. raise Exceptions::NotAuthorized, __("Neither an SSO environment variable 'REMOTE_USER' nor a 'X-Forwarded-User' header could be found.") if login.blank?
  23. raise Exceptions::NotAuthorized, "User '#{login}' could not be found." if user.blank?
  24. session.delete(:switched_from_user_id)
  25. authentication_check_prerequesits(user, 'SSO', {})
  26. initiate_session_for(user)
  27. redirect_to '/#'
  28. end
  29. def show
  30. user = authentication_check_only
  31. raise Exceptions::NotAuthorized, 'no valid session' if user.blank?
  32. # return current session
  33. render json: SessionHelper.json_hash(user).merge(config: config_frontend)
  34. rescue Exceptions::NotAuthorized => e
  35. render json: {
  36. error: e.message,
  37. config: config_frontend,
  38. models: SessionHelper.models,
  39. collections: { Locale.to_app_model => Locale.where(active: true) }
  40. }
  41. end
  42. # "Delete" a login, aka "log the user out"
  43. def destroy
  44. if %w[test development].include?(Rails.env) && ENV['FAKE_SELENIUM_LOGIN_USER_ID'].present?
  45. ENV['FAKE_SELENIUM_LOGIN_USER_ID'] = nil # rubocop:disable Rails/EnvironmentVariableAccess
  46. end
  47. reset_session
  48. # Remove the user id from the session
  49. @_current_user = nil
  50. # reset session
  51. request.env['rack.session.options'][:expire_after] = nil
  52. render json: {}
  53. end
  54. def create_omniauth
  55. # in case, remove switched_from_user_id
  56. session[:switched_from_user_id] = nil
  57. auth = request.env['omniauth.auth']
  58. if !auth
  59. logger.info('AUTH IS NULL, SERVICE NOT LINKED TO ACCOUNT')
  60. # redirect to app
  61. redirect_to '/'
  62. end
  63. # Create a new user or add an auth to existing user, depending on
  64. # whether there is already a user signed in.
  65. authorization = Authorization.find_from_hash(auth)
  66. if !authorization
  67. authorization = Authorization.create_from_hash(auth, current_user)
  68. end
  69. if in_maintenance_mode?(authorization.user)
  70. redirect_to '/#'
  71. return
  72. end
  73. # set current session user
  74. current_user_set(authorization.user)
  75. # log new session
  76. authorization.user.activity_stream_log('session started', authorization.user.id, true)
  77. # remember last login date
  78. authorization.user.update_last_login
  79. # redirect to app
  80. redirect_to '/'
  81. end
  82. def failure_omniauth
  83. raise Exceptions::UnprocessableEntity, "Message from #{params[:strategy]}: #{params[:message]}"
  84. end
  85. # "switch" to user
  86. def switch_to_user
  87. # check user
  88. if !params[:id]
  89. render(
  90. json: { message: 'no user given' },
  91. status: :not_found
  92. )
  93. return false
  94. end
  95. user = User.find(params[:id])
  96. if !user
  97. render(
  98. json: {},
  99. status: :not_found
  100. )
  101. return false
  102. end
  103. # remember original user
  104. session[:switched_from_user_id] ||= current_user.id
  105. # log new session
  106. user.activity_stream_log('switch to', current_user.id, true)
  107. # set session user
  108. current_user_set(user)
  109. render(
  110. json: {
  111. success: true,
  112. location: '',
  113. },
  114. )
  115. end
  116. # "switch" back to user
  117. def switch_back_to_user
  118. # check if it's a switch back
  119. raise Exceptions::Forbidden if !session[:switched_from_user_id]
  120. user = User.lookup(id: session[:switched_from_user_id])
  121. if !user
  122. render(
  123. json: {},
  124. status: :not_found
  125. )
  126. return false
  127. end
  128. # remember current user
  129. current_session_user = current_user
  130. # remove switched_from_user_id
  131. session[:switched_from_user_id] = nil
  132. # set old session user again
  133. current_user_set(user)
  134. # log end session
  135. current_session_user.activity_stream_log('ended switch to', user.id, true)
  136. render(
  137. json: {
  138. success: true,
  139. location: '',
  140. },
  141. )
  142. end
  143. def available
  144. render json: {
  145. app_version: AppVersion.get
  146. }
  147. end
  148. def list
  149. assets = {}
  150. sessions_clean = []
  151. SessionHelper.list.each do |session|
  152. next if session.data['user_id'].blank?
  153. sessions_clean.push session
  154. next if session.data['user_id']
  155. user = User.lookup(id: session.data['user_id'])
  156. next if !user
  157. assets = user.assets(assets)
  158. end
  159. render json: {
  160. sessions: sessions_clean,
  161. assets: assets,
  162. }
  163. end
  164. def delete
  165. SessionHelper.destroy(params[:id])
  166. render json: {}
  167. end
  168. private
  169. def authenticate_with_password
  170. auth = Auth.new(params[:username], params[:password])
  171. raise_unified_login_error if !auth.valid?
  172. session.delete(:switched_from_user_id)
  173. authentication_check_prerequesits(auth.user, 'session', {})
  174. end
  175. def initiate_session_for(user)
  176. request.env['rack.session.options'][:expire_after] = 1.year if params[:remember_me]
  177. # Mark the session as "persistent". Non-persistent sessions (e.g. sessions generated by curl API call) are
  178. # deleted periodically in SessionHelper.cleanup_expired.
  179. session[:persistent] = true
  180. user.activity_stream_log('session started', user.id, true)
  181. end
  182. def config_frontend
  183. # config
  184. config = {}
  185. Setting.select('name, preferences').where(frontend: true).each do |setting|
  186. next if setting.preferences[:authentication] == true && !current_user
  187. value = Setting.get(setting.name)
  188. next if !current_user && (value == false || value.nil?)
  189. config[setting.name] = value
  190. end
  191. # remember if we can switch back to user
  192. if session[:switched_from_user_id]
  193. config['switch_back_to_possible'] = true
  194. end
  195. # remember session_id for websocket logon
  196. if current_user
  197. config['session_id'] = session.id.public_id
  198. end
  199. config
  200. end
  201. end