sessions_controller.rb 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275
  1. # Copyright (C) 2012-2014 Zammad Foundation, http://zammad-foundation.org/
  2. class SessionsController < ApplicationController
  3. # "Create" a login, aka "log the user in"
  4. def create
  5. # in case, remove switched_from_user_id
  6. session[:switched_from_user_id] = nil
  7. # authenticate user
  8. user = User.authenticate( params[:username], params[:password] )
  9. # auth failed
  10. if !user
  11. render json: { error: 'login failed' }, status: :unauthorized
  12. return
  13. end
  14. # remember me - set session cookie to expire later
  15. if params[:remember_me]
  16. request.env['rack.session.options'][:expire_after] = 1.year
  17. else
  18. request.env['rack.session.options'][:expire_after] = nil
  19. end
  20. # both not needed to set :expire_after works fine
  21. # request.env['rack.session.options'][:renew] = true
  22. # reset_session
  23. # set session user
  24. current_user_set(user)
  25. # log device
  26. return if !user_device_log(user, 'session')
  27. # log new session
  28. user.activity_stream_log( 'session started', user.id, true )
  29. # auto population of default collections
  30. collections, assets = SessionHelper.default_collections(user)
  31. # add session user assets
  32. assets = user.assets(assets)
  33. # get models
  34. models = SessionHelper.models(user)
  35. # sessions created via this
  36. # controller are persistent
  37. session[:persistent] = true
  38. # return new session data
  39. render status: :created,
  40. json: {
  41. session: user,
  42. config: config_frontend,
  43. models: models,
  44. collections: collections,
  45. assets: assets,
  46. }
  47. end
  48. def show
  49. user_id = nil
  50. # no valid sessions
  51. if session[:user_id]
  52. user_id = session[:user_id]
  53. end
  54. if !user_id
  55. # get models
  56. models = SessionHelper.models()
  57. render json: {
  58. error: 'no valid session',
  59. config: config_frontend,
  60. models: models,
  61. collections: {
  62. Locale.to_app_model => Locale.where( active: true )
  63. },
  64. }
  65. return
  66. end
  67. # Save the user ID in the session so it can be used in
  68. # subsequent requests
  69. user = User.find( user_id )
  70. # log device
  71. return if !user_device_log(user, 'session')
  72. # auto population of default collections
  73. collections, assets = SessionHelper.default_collections(user)
  74. # add session user assets
  75. assets = user.assets(assets)
  76. # get models
  77. models = SessionHelper.models(user)
  78. # return current session
  79. render json: {
  80. session: user,
  81. config: config_frontend,
  82. models: models,
  83. collections: collections,
  84. assets: assets,
  85. }
  86. end
  87. # "Delete" a login, aka "log the user out"
  88. def destroy
  89. # Remove the user id from the session
  90. @_current_user = session[:user_id] = nil
  91. # reset session cookie (reset :expire_after in case remember_me is active)
  92. request.env['rack.session.options'][:expire_after] = -1.year
  93. request.env['rack.session.options'][:renew] = true
  94. render json: {}
  95. end
  96. def create_omniauth
  97. # in case, remove switched_from_user_id
  98. session[:switched_from_user_id] = nil
  99. auth = request.env['omniauth.auth']
  100. if !auth
  101. logger.info('AUTH IS NULL, SERVICE NOT LINKED TO ACCOUNT')
  102. # redirect to app
  103. redirect_to '/'
  104. end
  105. # Create a new user or add an auth to existing user, depending on
  106. # whether there is already a user signed in.
  107. authorization = Authorization.find_from_hash(auth)
  108. if !authorization
  109. authorization = Authorization.create_from_hash(auth, current_user)
  110. end
  111. # set current session user
  112. current_user_set(authorization.user)
  113. # log new session
  114. authorization.user.activity_stream_log( 'session started', authorization.user.id, true )
  115. # remember last login date
  116. authorization.user.update_last_login
  117. # redirect to app
  118. redirect_to '/'
  119. end
  120. def create_sso
  121. # in case, remove switched_from_user_id
  122. session[:switched_from_user_id] = nil
  123. user = User.sso(params)
  124. # Log the authorizing user in.
  125. if user
  126. # set current session user
  127. current_user_set(user)
  128. # log new session
  129. user.activity_stream_log( 'session started', user.id, true )
  130. # remember last login date
  131. user.update_last_login
  132. end
  133. # redirect to app
  134. redirect_to '/#'
  135. end
  136. # "switch" to user
  137. def switch_to_user
  138. return if deny_if_not_role(Z_ROLENAME_ADMIN)
  139. # check user
  140. if !params[:id]
  141. render(
  142. json: { message: 'no user given' },
  143. status: :not_found
  144. )
  145. return false
  146. end
  147. user = User.lookup( id: params[:id] )
  148. if !user
  149. render(
  150. json: {},
  151. status: :not_found
  152. )
  153. return false
  154. end
  155. # remember old user
  156. session[:switched_from_user_id] = current_user.id
  157. # log new session
  158. user.activity_stream_log( 'switch to', current_user.id, true )
  159. # set session user
  160. current_user_set(user)
  161. redirect_to '/#'
  162. end
  163. # "switch" back to user
  164. def switch_back_to_user
  165. # check if it's a swich back
  166. if !session[:switched_from_user_id]
  167. response_access_deny
  168. return false
  169. end
  170. user = User.lookup( id: session[:switched_from_user_id] )
  171. if !user
  172. render(
  173. json: {},
  174. status: :not_found
  175. )
  176. return false
  177. end
  178. # rememeber current user
  179. current_session_user = current_user
  180. # remove switched_from_user_id
  181. session[:switched_from_user_id] = nil
  182. # set old session user again
  183. current_user_set(user)
  184. # log end session
  185. current_session_user.activity_stream_log( 'ended switch to', user.id, true )
  186. redirect_to '/#'
  187. end
  188. def list
  189. return if deny_if_not_role(Z_ROLENAME_ADMIN)
  190. assets = {}
  191. sessions_clean = []
  192. SessionHelper.list.each {|session|
  193. next if !session.data['user_id']
  194. sessions_clean.push session
  195. if session.data['user_id']
  196. user = User.lookup( id: session.data['user_id'] )
  197. assets = user.assets( assets )
  198. end
  199. }
  200. render json: {
  201. sessions: sessions_clean,
  202. assets: assets,
  203. }
  204. end
  205. def delete
  206. return if deny_if_not_role(Z_ROLENAME_ADMIN)
  207. SessionHelper.destroy( params[:id] )
  208. render json: {}
  209. end
  210. end