application_controller.rb 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395
  1. # Copyright (C) 2012-2014 Zammad Foundation, http://zammad-foundation.org/
  2. class ApplicationController < ActionController::Base
  3. # http_basic_authenticate_with :name => "test", :password => "ttt"
  4. helper_method :current_user,
  5. :authentication_check,
  6. :config_frontend,
  7. :role?,
  8. :model_create_render,
  9. :model_update_render,
  10. :model_restory_render,
  11. :mode_show_rendeder,
  12. :model_index_render
  13. skip_before_action :verify_authenticity_token
  14. before_action :set_user, :session_update
  15. before_action :cors_preflight_check
  16. after_action :user_device_update, :set_access_control_headers
  17. after_action :trigger_events
  18. # For all responses in this controller, return the CORS access control headers.
  19. def set_access_control_headers
  20. headers['Access-Control-Allow-Origin'] = '*'
  21. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  22. headers['Access-Control-Max-Age'] = '1728000'
  23. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  24. headers['Access-Control-Allow-Credentials'] = 'true'
  25. end
  26. # If this is a preflight OPTIONS request, then short-circuit the
  27. # request, return only the necessary headers and return an empty
  28. # text/plain.
  29. def cors_preflight_check
  30. return if request.method != 'OPTIONS'
  31. headers['Access-Control-Allow-Origin'] = '*'
  32. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  33. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  34. headers['Access-Control-Max-Age'] = '1728000'
  35. headers['Access-Control-Allow-Credentials'] = 'true'
  36. render text: '', content_type: 'text/plain'
  37. false
  38. end
  39. private
  40. # execute events
  41. def trigger_events
  42. Observer::Ticket::Notification.transaction
  43. end
  44. # Finds the User with the ID stored in the session with the key
  45. # :current_user_id This is a common way to handle user login in
  46. # a Rails application; logging in sets the session value and
  47. # logging out removes it.
  48. def current_user
  49. return @_current_user if @_current_user
  50. return if !session[:user_id]
  51. @_current_user = User.find( session[:user_id] )
  52. end
  53. def current_user_set(user)
  54. session[:user_id] = user.id
  55. @_current_user = user
  56. set_user
  57. end
  58. # Sets the current user into a named Thread location so that it can be accessed
  59. # by models and observers
  60. def set_user
  61. return if !current_user
  62. UserInfo.current_user_id = current_user.id
  63. end
  64. # update session updated_at
  65. def session_update
  66. #sleep 0.6
  67. session[:ping] = Time.zone.now.iso8601
  68. # check if remote ip need to be updated
  69. if !session[:remote_id] || session[:remote_id] != request.remote_ip
  70. session[:remote_id] = request.remote_ip
  71. session[:geo] = Service::GeoIp.location( request.remote_ip )
  72. end
  73. # fill user agent
  74. return if session[:user_agent]
  75. session[:user_agent] = request.env['HTTP_USER_AGENT']
  76. end
  77. # user device recent action update
  78. def user_device_update
  79. # return if we are in switch to user mode
  80. return if session[:switched_from_user_id]
  81. # only if user_id exists
  82. return if !session[:user_id]
  83. # only with user device
  84. if !session[:user_device_id]
  85. if params[:fingerprint]
  86. return false if !user_device_log(current_user, 'session')
  87. end
  88. return
  89. end
  90. # check if entry exists / only if write action
  91. return if request.method == 'GET' || request.method == 'OPTIONS'
  92. # only update if needed
  93. return if session[:user_device_update_at] && session[:user_device_update_at] > Time.zone.now - 5.minutes
  94. session[:user_device_update_at] = Time.zone.now
  95. UserDevice.action(
  96. session[:user_device_id],
  97. session[:user_agent],
  98. session[:remote_id],
  99. session[:user_id],
  100. )
  101. end
  102. def user_device_log(user, type)
  103. # return if we are in switch to user mode
  104. return true if session[:switched_from_user_id]
  105. # for sessions we need the fingperprint
  106. if !params[:fingerprint] && type == 'session'
  107. render json: { error: 'Need fingerprint param!' }, status: :unprocessable_entity
  108. return false
  109. end
  110. # add defice if needed
  111. user_device = UserDevice.add(
  112. request.env['HTTP_USER_AGENT'],
  113. request.remote_ip,
  114. user.id,
  115. params[:fingerprint],
  116. type,
  117. )
  118. session[:user_device_id] = user_device.id
  119. end
  120. def authentication_check_only(auth_param)
  121. logger.debug 'authentication_check'
  122. #logger.debug params.inspect
  123. #logger.debug session.inspect
  124. #logger.debug cookies.inspect
  125. # already logged in, early exit
  126. if session.id && session[:user_id]
  127. userdata = User.find(session[:user_id])
  128. current_user_set(userdata)
  129. return {
  130. auth: true
  131. }
  132. end
  133. error_message = 'authentication failed'
  134. # check sso based authentication
  135. sso_userdata = User.sso(params)
  136. if sso_userdata
  137. session[:persistent] = true
  138. return {
  139. auth: true
  140. }
  141. end
  142. # check http basic based authentication
  143. authenticate_with_http_basic do |username, password|
  144. logger.debug "http basic auth check '#{username}'"
  145. userdata = User.authenticate( username, password )
  146. next if !userdata
  147. current_user_set(userdata)
  148. user_device_log(userdata, 'basic_auth')
  149. return {
  150. auth: true
  151. }
  152. end
  153. # check http token based authentication
  154. if auth_param[:token_action]
  155. authenticate_with_http_token do |token, _options|
  156. logger.debug "token auth check '#{token}'"
  157. userdata = Token.check(
  158. action: auth_param[:token_action],
  159. name: token,
  160. )
  161. next if !userdata
  162. current_user_set(userdata)
  163. user_device_log(userdata, 'token_auth')
  164. return {
  165. auth: true
  166. }
  167. end
  168. end
  169. logger.debug error_message
  170. {
  171. auth: false,
  172. message: error_message,
  173. }
  174. end
  175. def authentication_check( auth_param = {} )
  176. result = authentication_check_only(auth_param)
  177. # check if basic_auth fallback is possible
  178. if auth_param[:basic_auth_promt] && result[:auth] == false
  179. return request_http_basic_authentication
  180. end
  181. # return auth not ok
  182. if result[:auth] == false
  183. render(
  184. json: {
  185. error: result[:message],
  186. },
  187. status: :unauthorized
  188. )
  189. return false
  190. end
  191. # return auth ok
  192. true
  193. end
  194. def role?( role_name )
  195. return false if !current_user
  196. current_user.role?( role_name )
  197. end
  198. def ticket_permission(ticket)
  199. return true if ticket.permission( current_user: current_user )
  200. response_access_deny
  201. false
  202. end
  203. def deny_if_not_role( role_name )
  204. return false if role?( role_name )
  205. response_access_deny
  206. true
  207. end
  208. def valid_session_with_user
  209. return true if current_user
  210. render json: { message: 'No session user!' }, status: :unprocessable_entity
  211. false
  212. end
  213. def response_access_deny
  214. render(
  215. json: {},
  216. status: :unauthorized
  217. )
  218. false
  219. end
  220. def config_frontend
  221. # config
  222. config = {}
  223. Setting.select('name').where( frontend: true ).each { |setting|
  224. config[setting.name] = Setting.get(setting.name)
  225. }
  226. # get all time zones
  227. config['timezones'] = Calendar.timezones
  228. # remember if we can to swich back to user
  229. if session[:switched_from_user_id]
  230. config['switch_back_to_possible'] = true
  231. end
  232. # remember session_id for websocket logon
  233. config['session_id'] = session.id
  234. config
  235. end
  236. # model helper
  237. def model_create_render (object, params)
  238. # create object
  239. generic_object = object.new( object.param_cleanup( params[object.to_app_model_url], true ) )
  240. # save object
  241. generic_object.save!
  242. # set relations
  243. generic_object.param_set_associations( params )
  244. model_create_render_item(generic_object)
  245. rescue => e
  246. logger.error e.message
  247. logger.error e.backtrace.inspect
  248. render json: { error: e.message }, status: :unprocessable_entity
  249. end
  250. def model_create_render_item (generic_object)
  251. render json: generic_object.attributes_with_associations, status: :created
  252. end
  253. def model_update_render (object, params)
  254. # find object
  255. generic_object = object.find( params[:id] )
  256. # save object
  257. generic_object.update_attributes!( object.param_cleanup( params[object.to_app_model_url] ) )
  258. # set relations
  259. generic_object.param_set_associations( params )
  260. model_update_render_item( generic_object )
  261. rescue => e
  262. logger.error e.message
  263. logger.error e.backtrace.inspect
  264. render json: { error: e.message }, status: :unprocessable_entity
  265. end
  266. def model_update_render_item (generic_object)
  267. render json: generic_object.attributes_with_associations, status: :ok
  268. end
  269. def model_destory_render (object, params)
  270. generic_object = object.find( params[:id] )
  271. generic_object.destroy
  272. model_destory_render_item()
  273. rescue => e
  274. logger.error e.message
  275. logger.error e.backtrace.inspect
  276. render json: { error: e.message }, status: :unprocessable_entity
  277. end
  278. def model_destory_render_item ()
  279. render json: {}, status: :ok
  280. end
  281. def model_show_render (object, params)
  282. if params[:full]
  283. generic_object_full = object.full( params[:id] )
  284. render json: generic_object_full, status: :ok
  285. return
  286. end
  287. generic_object = object.find( params[:id] )
  288. model_show_render_item(generic_object)
  289. rescue => e
  290. logger.error e.message
  291. logger.error e.backtrace.inspect
  292. render json: { error: e.message }, status: :unprocessable_entity
  293. end
  294. def model_show_render_item (generic_object)
  295. render json: generic_object.attributes_with_associations, status: :ok
  296. end
  297. def model_index_render (object, _params)
  298. generic_objects = object.all
  299. model_index_render_result( generic_objects )
  300. rescue => e
  301. logger.error e.message
  302. logger.error e.backtrace.inspect
  303. render json: { error: e.message }, status: :unprocessable_entity
  304. end
  305. def model_index_render_result (generic_objects)
  306. render json: generic_objects, status: :ok
  307. end
  308. end