sessions_controller.rb 6.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306
  1. # Copyright (C) 2012-2014 Zammad Foundation, http://zammad-foundation.org/
  2. class SessionsController < ApplicationController
  3. # "Create" a login, aka "log the user in"
  4. def create
  5. # in case, remove switched_from_user_id
  6. session[:switched_from_user_id] = nil
  7. # authenticate user
  8. user = User.authenticate(params[:username], params[:password])
  9. # check maintenance mode
  10. return if check_maintenance(user)
  11. # auth failed
  12. if !user
  13. render json: { error: 'Wrong Username and Password combination.' }, status: :unauthorized
  14. return
  15. end
  16. # remember me - set session cookie to expire later
  17. request.env['rack.session.options'][:expire_after] = if params[:remember_me]
  18. 1.year
  19. end
  20. # both not needed to set :expire_after works fine
  21. # request.env['rack.session.options'][:renew] = true
  22. # reset_session
  23. # set session user
  24. current_user_set(user)
  25. # log device
  26. return if !user_device_log(user, 'session')
  27. # log new session
  28. user.activity_stream_log('session started', user.id, true)
  29. # add session user assets
  30. assets = {}
  31. assets = user.assets(assets)
  32. # auto population of default collections
  33. collections, assets = SessionHelper.default_collections(user, assets)
  34. # get models
  35. models = SessionHelper.models(user)
  36. # sessions created via this
  37. # controller are persistent
  38. session[:persistent] = true
  39. # return new session data
  40. render status: :created,
  41. json: {
  42. session: user,
  43. config: config_frontend,
  44. models: models,
  45. collections: collections,
  46. assets: assets,
  47. }
  48. end
  49. def show
  50. user_id = nil
  51. # no valid sessions
  52. if session[:user_id]
  53. user_id = session[:user_id]
  54. end
  55. if !user_id
  56. # get models
  57. models = SessionHelper.models()
  58. render json: {
  59. error: 'no valid session',
  60. config: config_frontend,
  61. models: models,
  62. collections: {
  63. Locale.to_app_model => Locale.where(active: true)
  64. },
  65. }
  66. return
  67. end
  68. # Save the user ID in the session so it can be used in
  69. # subsequent requests
  70. user = User.find(user_id)
  71. # log device
  72. return if !user_device_log(user, 'session')
  73. # add session user assets
  74. assets = {}
  75. assets = user.assets(assets)
  76. # auto population of default collections
  77. collections, assets = SessionHelper.default_collections(user, assets)
  78. # get models
  79. models = SessionHelper.models(user)
  80. # return current session
  81. render json: {
  82. session: user,
  83. config: config_frontend,
  84. models: models,
  85. collections: collections,
  86. assets: assets,
  87. }
  88. end
  89. # "Delete" a login, aka "log the user out"
  90. def destroy
  91. # Remove the user id from the session
  92. @_current_user = session[:user_id] = nil
  93. # reset session cookie (reset :expire_after in case remember_me is active)
  94. request.env['rack.session.options'][:expire_after] = -1.years
  95. request.env['rack.session.options'][:renew] = true
  96. render json: {}
  97. end
  98. def create_omniauth
  99. # in case, remove switched_from_user_id
  100. session[:switched_from_user_id] = nil
  101. auth = request.env['omniauth.auth']
  102. if !auth
  103. logger.info('AUTH IS NULL, SERVICE NOT LINKED TO ACCOUNT')
  104. # redirect to app
  105. redirect_to '/'
  106. end
  107. # Create a new user or add an auth to existing user, depending on
  108. # whether there is already a user signed in.
  109. authorization = Authorization.find_from_hash(auth)
  110. if !authorization
  111. authorization = Authorization.create_from_hash(auth, current_user)
  112. end
  113. # check maintenance mode
  114. if check_maintenance_only(authorization.user)
  115. redirect_to '/#'
  116. return
  117. end
  118. # set current session user
  119. current_user_set(authorization.user)
  120. # log new session
  121. authorization.user.activity_stream_log('session started', authorization.user.id, true)
  122. # remember last login date
  123. authorization.user.update_last_login
  124. # redirect to app
  125. redirect_to '/'
  126. end
  127. def create_sso
  128. # in case, remove switched_from_user_id
  129. session[:switched_from_user_id] = nil
  130. user = User.sso(params)
  131. # Log the authorizing user in.
  132. if user
  133. # check maintenance mode
  134. if check_maintenance_only(user)
  135. redirect_to '/#'
  136. return
  137. end
  138. # set current session user
  139. current_user_set(user)
  140. # log new session
  141. user.activity_stream_log('session started', user.id, true)
  142. # remember last login date
  143. user.update_last_login
  144. end
  145. # redirect to app
  146. redirect_to '/#'
  147. end
  148. # "switch" to user
  149. def switch_to_user
  150. return if deny_if_not_role(Z_ROLENAME_ADMIN)
  151. # check user
  152. if !params[:id]
  153. render(
  154. json: { message: 'no user given' },
  155. status: :not_found
  156. )
  157. return false
  158. end
  159. user = User.find(params[:id])
  160. if !user
  161. render(
  162. json: {},
  163. status: :not_found
  164. )
  165. return false
  166. end
  167. # remember old user
  168. session[:switched_from_user_id] = current_user.id
  169. # log new session
  170. user.activity_stream_log('switch to', current_user.id, true)
  171. # set session user
  172. current_user_set(user)
  173. render(
  174. json: {
  175. success: true,
  176. location: '',
  177. },
  178. )
  179. end
  180. # "switch" back to user
  181. def switch_back_to_user
  182. # check if it's a swich back
  183. if !session[:switched_from_user_id]
  184. response_access_deny
  185. return false
  186. end
  187. user = User.lookup(id: session[:switched_from_user_id])
  188. if !user
  189. render(
  190. json: {},
  191. status: :not_found
  192. )
  193. return false
  194. end
  195. # rememeber current user
  196. current_session_user = current_user
  197. # remove switched_from_user_id
  198. session[:switched_from_user_id] = nil
  199. # set old session user again
  200. current_user_set(user)
  201. # log end session
  202. current_session_user.activity_stream_log('ended switch to', user.id, true)
  203. render(
  204. json: {
  205. success: true,
  206. location: '',
  207. },
  208. )
  209. end
  210. def available
  211. render json: {
  212. app_version: AppVersion.get
  213. }
  214. end
  215. def list
  216. return if deny_if_not_role(Z_ROLENAME_ADMIN)
  217. assets = {}
  218. sessions_clean = []
  219. SessionHelper.list.each {|session|
  220. next if !session.data['user_id']
  221. sessions_clean.push session
  222. if session.data['user_id']
  223. user = User.lookup(id: session.data['user_id'])
  224. assets = user.assets(assets)
  225. end
  226. }
  227. render json: {
  228. sessions: sessions_clean,
  229. assets: assets,
  230. }
  231. end
  232. def delete
  233. return if deny_if_not_role(Z_ROLENAME_ADMIN)
  234. SessionHelper.destroy(params[:id])
  235. render json: {}
  236. end
  237. end