application_controller.rb 23 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757
  1. # Copyright (C) 2012-2016 Zammad Foundation, http://zammad-foundation.org/
  2. require 'exceptions'
  3. class ApplicationController < ActionController::Base
  4. # http_basic_authenticate_with :name => "test", :password => "ttt"
  5. helper_method :current_user,
  6. :authentication_check,
  7. :config_frontend,
  8. :http_log_config,
  9. :model_create_render,
  10. :model_update_render,
  11. :model_restory_render,
  12. :mode_show_rendeder,
  13. :model_index_render
  14. skip_before_action :verify_authenticity_token
  15. before_action :transaction_begin, :set_user, :session_update, :user_device_check, :cors_preflight_check
  16. after_action :transaction_end, :http_log, :set_access_control_headers
  17. rescue_from StandardError, with: :server_error
  18. rescue_from ExecJS::RuntimeError, with: :server_error
  19. rescue_from ActiveRecord::RecordNotFound, with: :not_found
  20. rescue_from ActiveRecord::StatementInvalid, with: :unprocessable_entity
  21. rescue_from ActiveRecord::RecordInvalid, with: :unprocessable_entity
  22. rescue_from ArgumentError, with: :unprocessable_entity
  23. rescue_from Exceptions::UnprocessableEntity, with: :unprocessable_entity
  24. rescue_from Exceptions::NotAuthorized, with: :unauthorized
  25. # For all responses in this controller, return the CORS access control headers.
  26. def set_access_control_headers
  27. headers['Access-Control-Allow-Origin'] = '*'
  28. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  29. headers['Access-Control-Max-Age'] = '1728000'
  30. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  31. headers['Access-Control-Allow-Credentials'] = 'true'
  32. end
  33. # If this is a preflight OPTIONS request, then short-circuit the
  34. # request, return only the necessary headers and return an empty
  35. # text/plain.
  36. def cors_preflight_check
  37. return if request.method != 'OPTIONS'
  38. headers['Access-Control-Allow-Origin'] = '*'
  39. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  40. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  41. headers['Access-Control-Max-Age'] = '1728000'
  42. headers['Access-Control-Allow-Credentials'] = 'true'
  43. render text: '', content_type: 'text/plain'
  44. false
  45. end
  46. def http_log_config(config)
  47. @http_log_support = config
  48. end
  49. private
  50. def transaction_begin
  51. ApplicationHandleInfo.current = 'application_server'
  52. PushMessages.init
  53. end
  54. def transaction_end
  55. Observer::Transaction.commit
  56. PushMessages.finish
  57. ActiveSupport::Dependencies::Reference.clear!
  58. end
  59. # Finds the User with the ID stored in the session with the key
  60. # :current_user_id This is a common way to handle user login in
  61. # a Rails application; logging in sets the session value and
  62. # logging out removes it.
  63. def current_user
  64. return @_current_user if @_current_user
  65. return if !session[:user_id]
  66. @_current_user = User.lookup(id: session[:user_id])
  67. end
  68. def current_user_set(user)
  69. session[:user_id] = user.id
  70. @_current_user = user
  71. set_user
  72. end
  73. # Sets the current user into a named Thread location so that it can be accessed
  74. # by models and observers
  75. def set_user
  76. if !current_user
  77. UserInfo.current_user_id = 1
  78. return
  79. end
  80. UserInfo.current_user_id = current_user.id
  81. end
  82. # update session updated_at
  83. def session_update
  84. #sleep 0.6
  85. session[:ping] = Time.zone.now.iso8601
  86. # check if remote ip need to be updated
  87. if !session[:remote_ip] || session[:remote_ip] != request.remote_ip
  88. session[:remote_ip] = request.remote_ip
  89. session[:geo] = Service::GeoIp.location(request.remote_ip)
  90. end
  91. # fill user agent
  92. return if session[:user_agent]
  93. session[:user_agent] = request.env['HTTP_USER_AGENT']
  94. end
  95. # log http access
  96. def http_log
  97. return if !@http_log_support
  98. # request
  99. request_data = {
  100. content: '',
  101. content_type: request.headers['Content-Type'],
  102. content_encoding: request.headers['Content-Encoding'],
  103. source: request.headers['User-Agent'] || request.headers['Server'],
  104. }
  105. request.headers.each { |key, value|
  106. next if key[0, 5] != 'HTTP_'
  107. request_data[:content] += if key == 'HTTP_COOKIE'
  108. "#{key}: xxxxx\n"
  109. else
  110. "#{key}: #{value}\n"
  111. end
  112. }
  113. body = request.body.read
  114. if body
  115. request_data[:content] += "\n" + body
  116. end
  117. request_data[:content] = request_data[:content].slice(0, 8000)
  118. # response
  119. response_data = {
  120. code: response.status = response.code,
  121. content: '',
  122. content_type: nil,
  123. content_encoding: nil,
  124. source: nil,
  125. }
  126. response.headers.each { |key, value|
  127. response_data[:content] += "#{key}: #{value}\n"
  128. }
  129. body = response.body
  130. if body
  131. response_data[:content] += "\n" + body
  132. end
  133. response_data[:content] = response_data[:content].slice(0, 8000)
  134. record = {
  135. direction: 'in',
  136. facility: @http_log_support[:facility],
  137. url: url_for(only_path: false, overwrite_params: {}),
  138. status: response.status,
  139. ip: request.remote_ip,
  140. request: request_data,
  141. response: response_data,
  142. method: request.method,
  143. }
  144. HttpLog.create(record)
  145. end
  146. def user_device_check
  147. return false if !user_device_log(current_user, 'session')
  148. true
  149. end
  150. def user_device_log(user, type)
  151. switched_from_user_id = ENV['SWITCHED_FROM_USER_ID'] || session[:switched_from_user_id]
  152. return true if params[:controller] == 'init' # do no device logging on static inital page
  153. return true if switched_from_user_id
  154. return true if !user
  155. return true if !user.permissions?('user_preferences.device')
  156. time_to_check = true
  157. user_device_updated_at = session[:user_device_updated_at]
  158. if ENV['USER_DEVICE_UPDATED_AT']
  159. user_device_updated_at = Time.zone.parse(ENV['USER_DEVICE_UPDATED_AT'])
  160. end
  161. if user_device_updated_at
  162. # check if entry exists / only if write action
  163. diff = Time.zone.now - 10.minutes
  164. method = request.method
  165. if method == 'GET' || method == 'OPTIONS' || method == 'HEAD'
  166. diff = Time.zone.now - 30.minutes
  167. end
  168. # only update if needed
  169. if user_device_updated_at > diff
  170. time_to_check = false
  171. end
  172. end
  173. # if ip has not changed and ttl in still valid
  174. remote_ip = ENV['TEST_REMOTE_IP'] || request.remote_ip
  175. return true if time_to_check == false && session[:user_device_remote_ip] == remote_ip
  176. session[:user_device_remote_ip] = remote_ip
  177. # for sessions we need the fingperprint
  178. if type == 'session'
  179. if !session[:user_device_updated_at] && !params[:fingerprint] && !session[:user_device_fingerprint]
  180. raise Exceptions::UnprocessableEntity, 'Need fingerprint param!'
  181. end
  182. if params[:fingerprint]
  183. session[:user_device_fingerprint] = params[:fingerprint]
  184. end
  185. end
  186. session[:user_device_updated_at] = Time.zone.now
  187. # add device if needed
  188. http_user_agent = ENV['HTTP_USER_AGENT'] || request.env['HTTP_USER_AGENT']
  189. Delayed::Job.enqueue(
  190. Observer::UserDeviceLogJob.new(
  191. http_user_agent,
  192. remote_ip,
  193. user.id,
  194. session[:user_device_fingerprint],
  195. type,
  196. )
  197. )
  198. end
  199. def authentication_check_only(auth_param)
  200. #logger.debug 'authentication_check'
  201. #logger.debug params.inspect
  202. #logger.debug session.inspect
  203. #logger.debug cookies.inspect
  204. # already logged in, early exit
  205. if session.id && session[:user_id]
  206. logger.debug 'session based auth check'
  207. user = User.lookup(id: session[:user_id])
  208. return authentication_check_prerequesits(user, 'session', auth_param) if user
  209. end
  210. # check sso based authentication
  211. sso_user = User.sso(params)
  212. if sso_user
  213. if authentication_check_prerequesits(sso_user, 'session', auth_param)
  214. session[:persistent] = true
  215. return sso_user
  216. end
  217. end
  218. # check http basic based authentication
  219. authenticate_with_http_basic do |username, password|
  220. request.session_options[:skip] = true # do not send a session cookie
  221. logger.debug "http basic auth check '#{username}'"
  222. if Setting.get('api_password_access') == false
  223. raise Exceptions::NotAuthorized, 'API password access disabled!'
  224. end
  225. user = User.authenticate(username, password)
  226. return authentication_check_prerequesits(user, 'basic_auth', auth_param) if user
  227. end
  228. # check http token based authentication
  229. authenticate_with_http_token do |token_string, _options|
  230. logger.debug "http token auth check '#{token_string}'"
  231. request.session_options[:skip] = true # do not send a session cookie
  232. if Setting.get('api_token_access') == false
  233. raise Exceptions::NotAuthorized, 'API token access disabled!'
  234. end
  235. user = Token.check(
  236. action: 'api',
  237. name: token_string,
  238. inactive_user: true,
  239. )
  240. if user && auth_param[:permission]
  241. user = Token.check(
  242. action: 'api',
  243. name: token_string,
  244. permission: auth_param[:permission],
  245. inactive_user: true,
  246. )
  247. raise Exceptions::NotAuthorized, 'Not authorized (token)!' if !user
  248. end
  249. if user
  250. token = Token.find_by(name: token_string)
  251. token.last_used_at = Time.zone.now
  252. token.save!
  253. if token.expires_at &&
  254. Time.zone.today >= token.expires_at
  255. raise Exceptions::NotAuthorized, 'Not authorized (token expired)!'
  256. end
  257. end
  258. @_token_auth = token_string # remember for permission_check
  259. return authentication_check_prerequesits(user, 'token_auth', auth_param) if user
  260. end
  261. # check oauth2 token based authentication
  262. token = Doorkeeper::OAuth::Token.from_bearer_authorization(request)
  263. if token
  264. request.session_options[:skip] = true # do not send a session cookie
  265. logger.debug "oauth2 token auth check '#{token}'"
  266. access_token = Doorkeeper::AccessToken.by_token(token)
  267. if !access_token
  268. raise Exceptions::NotAuthorized, 'Invalid token!'
  269. end
  270. # check expire
  271. if access_token.expires_in && (access_token.created_at + access_token.expires_in) < Time.zone.now
  272. raise Exceptions::NotAuthorized, 'OAuth2 token is expired!'
  273. end
  274. # if access_token.scopes.empty?
  275. # raise Exceptions::NotAuthorized, 'OAuth2 scope missing for token!'
  276. # end
  277. user = User.find(access_token.resource_owner_id)
  278. return authentication_check_prerequesits(user, 'token_auth', auth_param) if user
  279. end
  280. false
  281. end
  282. def authentication_check_prerequesits(user, auth_type, auth_param)
  283. if check_maintenance_only(user)
  284. raise Exceptions::NotAuthorized, 'Maintenance mode enabled!'
  285. end
  286. if user.active == false
  287. raise Exceptions::NotAuthorized, 'User is inactive!'
  288. end
  289. # check scopes / permission check
  290. if auth_param[:permission] && !user.permissions?(auth_param[:permission])
  291. raise Exceptions::NotAuthorized, 'Not authorized (user)!'
  292. end
  293. current_user_set(user)
  294. user_device_log(user, auth_type)
  295. logger.debug "#{auth_type} for '#{user.login}'"
  296. true
  297. end
  298. def authentication_check(auth_param = {})
  299. user = authentication_check_only(auth_param)
  300. # check if basic_auth fallback is possible
  301. if auth_param[:basic_auth_promt] && !user
  302. return request_http_basic_authentication
  303. end
  304. # return auth not ok
  305. if !user
  306. raise Exceptions::NotAuthorized, 'authentication failed'
  307. end
  308. # return auth ok
  309. true
  310. end
  311. def ticket_permission(ticket)
  312. return true if ticket.permission(current_user: current_user)
  313. raise Exceptions::NotAuthorized
  314. end
  315. def article_permission(article)
  316. ticket = Ticket.lookup(id: article.ticket_id)
  317. return true if ticket.permission(current_user: current_user)
  318. raise Exceptions::NotAuthorized
  319. end
  320. def article_create(ticket, params)
  321. # create article if given
  322. form_id = params[:form_id]
  323. params.delete(:form_id)
  324. # check min. params
  325. raise Exceptions::UnprocessableEntity, 'Need at least article: { body: "some text" }' if !params[:body]
  326. # fill default values
  327. if params[:type_id].empty? && params[:type].empty?
  328. params[:type_id] = Ticket::Article::Type.lookup(name: 'note').id
  329. end
  330. if params[:sender_id].empty? && params[:sender].empty?
  331. sender = 'Customer'
  332. if current_user.permissions?('ticket.agent')
  333. sender = 'Agent'
  334. end
  335. params[:sender_id] = Ticket::Article::Sender.lookup(name: sender).id
  336. end
  337. clean_params = Ticket::Article.param_association_lookup(params)
  338. clean_params = Ticket::Article.param_cleanup(clean_params, true)
  339. # overwrite params
  340. if !current_user.permissions?('ticket.agent')
  341. clean_params[:sender_id] = Ticket::Article::Sender.lookup(name: 'Customer').id
  342. clean_params.delete(:sender)
  343. type = Ticket::Article::Type.lookup(id: clean_params[:type_id])
  344. if type.name !~ /^(note|web)$/
  345. clean_params[:type_id] = Ticket::Article::Type.lookup(name: 'note').id
  346. end
  347. clean_params.delete(:type)
  348. clean_params[:internal] = false
  349. end
  350. article = Ticket::Article.new(clean_params)
  351. article.ticket_id = ticket.id
  352. # store dataurl images to store
  353. if form_id && article.body && article.content_type =~ %r{text/html}i
  354. article.body.gsub!( %r{(<img\s.+?src=")(data:image/(jpeg|png);base64,.+?)">}i ) { |_item|
  355. file_attributes = StaticAssets.data_url_attributes($2)
  356. cid = "#{ticket.id}.#{form_id}.#{rand(999_999)}@#{Setting.get('fqdn')}"
  357. headers_store = {
  358. 'Content-Type' => file_attributes[:mime_type],
  359. 'Mime-Type' => file_attributes[:mime_type],
  360. 'Content-ID' => cid,
  361. 'Content-Disposition' => 'inline',
  362. }
  363. store = Store.add(
  364. object: 'UploadCache',
  365. o_id: form_id,
  366. data: file_attributes[:content],
  367. filename: cid,
  368. preferences: headers_store
  369. )
  370. "#{$1}cid:#{cid}\">"
  371. }
  372. end
  373. # find attachments in upload cache
  374. if form_id
  375. article.attachments = Store.list(
  376. object: 'UploadCache',
  377. o_id: form_id,
  378. )
  379. end
  380. article.save!
  381. # remove attachments from upload cache
  382. return article if !form_id
  383. Store.remove(
  384. object: 'UploadCache',
  385. o_id: form_id,
  386. )
  387. article
  388. end
  389. def permission_check(key)
  390. if @_token_auth
  391. user = Token.check(
  392. action: 'api',
  393. name: @_token_auth,
  394. permission: key,
  395. )
  396. return false if user
  397. raise Exceptions::NotAuthorized, 'Not authorized (token)!'
  398. end
  399. return false if current_user && current_user.permissions?(key)
  400. raise Exceptions::NotAuthorized, 'Not authorized (user)!'
  401. end
  402. def valid_session_with_user
  403. return true if current_user
  404. raise Exceptions::UnprocessableEntity, 'No session user!'
  405. end
  406. def response_access_deny
  407. raise Exceptions::NotAuthorized
  408. end
  409. def config_frontend
  410. # config
  411. config = {}
  412. Setting.select('name, preferences').where(frontend: true).each { |setting|
  413. next if setting.preferences[:authentication] == true && !current_user
  414. value = Setting.get(setting.name)
  415. next if !current_user && (value == false || value.nil?)
  416. config[setting.name] = value
  417. }
  418. # remember if we can to swich back to user
  419. if session[:switched_from_user_id]
  420. config['switch_back_to_possible'] = true
  421. end
  422. # remember session_id for websocket logon
  423. if current_user
  424. config['session_id'] = session.id
  425. end
  426. config
  427. end
  428. # model helper
  429. def model_create_render(object, params)
  430. clean_params = object.param_association_lookup(params)
  431. clean_params = object.param_cleanup(clean_params, true)
  432. # create object
  433. generic_object = object.new(clean_params)
  434. # save object
  435. generic_object.save!
  436. # set relations
  437. generic_object.param_set_associations(params)
  438. if params[:expand]
  439. render json: generic_object.attributes_with_relation_names, status: :created
  440. return
  441. end
  442. model_create_render_item(generic_object)
  443. end
  444. def model_create_render_item(generic_object)
  445. render json: generic_object.attributes_with_associations, status: :created
  446. end
  447. def model_update_render(object, params)
  448. # find object
  449. generic_object = object.find(params[:id])
  450. clean_params = object.param_association_lookup(params)
  451. clean_params = object.param_cleanup(clean_params, true)
  452. generic_object.with_lock do
  453. # set attributes
  454. generic_object.update_attributes!(clean_params)
  455. # set relations
  456. generic_object.param_set_associations(params)
  457. end
  458. if params[:expand]
  459. render json: generic_object.attributes_with_relation_names, status: :ok
  460. return
  461. end
  462. model_update_render_item(generic_object)
  463. end
  464. def model_update_render_item(generic_object)
  465. render json: generic_object.attributes_with_associations, status: :ok
  466. end
  467. def model_destroy_render(object, params)
  468. generic_object = object.find(params[:id])
  469. generic_object.destroy!
  470. model_destroy_render_item()
  471. end
  472. def model_destroy_render_item ()
  473. render json: {}, status: :ok
  474. end
  475. def model_show_render(object, params)
  476. if params[:expand]
  477. generic_object = object.find(params[:id])
  478. render json: generic_object.attributes_with_relation_names, status: :ok
  479. return
  480. end
  481. if params[:full]
  482. generic_object_full = object.full(params[:id])
  483. render json: generic_object_full, status: :ok
  484. return
  485. end
  486. generic_object = object.find(params[:id])
  487. model_show_render_item(generic_object)
  488. end
  489. def model_show_render_item(generic_object)
  490. render json: generic_object.attributes_with_associations, status: :ok
  491. end
  492. def model_index_render(object, params)
  493. offset = 0
  494. per_page = 500
  495. if params[:page] && params[:per_page]
  496. offset = (params[:page].to_i - 1) * params[:per_page].to_i
  497. limit = params[:per_page].to_i
  498. end
  499. if per_page > 500
  500. per_page = 500
  501. end
  502. generic_objects = if offset.positive?
  503. object.limit(params[:per_page]).order(id: 'ASC').offset(offset).limit(limit)
  504. else
  505. object.all.order(id: 'ASC').offset(offset).limit(limit)
  506. end
  507. if params[:expand]
  508. list = []
  509. generic_objects.each { |generic_object|
  510. list.push generic_object.attributes_with_relation_names
  511. }
  512. render json: list, status: :ok
  513. return
  514. end
  515. if params[:full]
  516. assets = {}
  517. item_ids = []
  518. generic_objects.each { |item|
  519. item_ids.push item.id
  520. assets = item.assets(assets)
  521. }
  522. render json: {
  523. record_ids: item_ids,
  524. assets: assets,
  525. }, status: :ok
  526. return
  527. end
  528. generic_objects_with_associations = []
  529. generic_objects.each { |item|
  530. generic_objects_with_associations.push item.attributes_with_associations
  531. }
  532. model_index_render_result(generic_objects_with_associations)
  533. end
  534. def model_index_render_result(generic_objects)
  535. render json: generic_objects, status: :ok
  536. end
  537. def model_match_error(error)
  538. data = {
  539. error: error
  540. }
  541. if error =~ /Validation failed: (.+?)(,|$)/i
  542. data[:error_human] = $1
  543. end
  544. if error =~ /(already exists|duplicate key|duplicate entry)/i
  545. data[:error_human] = 'Object already exists!'
  546. end
  547. if error =~ /null value in column "(.+?)" violates not-null constraint/i
  548. data[:error_human] = "Attribute '#{$1}' required!"
  549. end
  550. if error =~ /Field '(.+?)' doesn't have a default value/i
  551. data[:error_human] = "Attribute '#{$1}' required!"
  552. end
  553. if Rails.env.production? && !data[:error_human].empty?
  554. data[:error] = data[:error_human]
  555. data.delete('error_human')
  556. end
  557. data
  558. end
  559. def model_references_check(object, params)
  560. generic_object = object.find(params[:id])
  561. result = Models.references(object, generic_object.id)
  562. return false if result.empty?
  563. raise Exceptions::UnprocessableEntity, 'Can\'t delete, object has references.'
  564. rescue => e
  565. raise Exceptions::UnprocessableEntity, e
  566. end
  567. def not_found(e)
  568. logger.error e.message
  569. logger.error e.backtrace.inspect
  570. respond_to do |format|
  571. format.json { render json: model_match_error(e.message), status: :not_found }
  572. format.any {
  573. @exception = e
  574. @traceback = !Rails.env.production?
  575. file = File.open(Rails.root.join('public', '404.html'), 'r')
  576. render inline: file.read, status: :not_found
  577. }
  578. end
  579. end
  580. def unprocessable_entity(e)
  581. logger.error e.message
  582. logger.error e.backtrace.inspect
  583. respond_to do |format|
  584. format.json { render json: model_match_error(e.message), status: :unprocessable_entity }
  585. format.any {
  586. @exception = e
  587. @traceback = !Rails.env.production?
  588. file = File.open(Rails.root.join('public', '422.html'), 'r')
  589. render inline: file.read, status: :unprocessable_entity
  590. }
  591. end
  592. end
  593. def server_error(e)
  594. logger.error e.message
  595. logger.error e.backtrace.inspect
  596. respond_to do |format|
  597. format.json { render json: model_match_error(e.message), status: 500 }
  598. format.any {
  599. @exception = e
  600. @traceback = !Rails.env.production?
  601. file = File.open(Rails.root.join('public', '500.html'), 'r')
  602. render inline: file.read, status: 500
  603. }
  604. end
  605. end
  606. def unauthorized(e)
  607. message = e.message
  608. if message == 'Exceptions::NotAuthorized'
  609. message = 'Not authorized'
  610. end
  611. error = model_match_error(message)
  612. if error && error[:error]
  613. response.headers['X-Failure'] = error[:error_human] || error[:error]
  614. end
  615. respond_to do |format|
  616. format.json { render json: error, status: :unauthorized }
  617. format.any {
  618. @exception = e
  619. @traceback = !Rails.env.production?
  620. file = File.open(Rails.root.join('public', '401.html'), 'r')
  621. render inline: file.read, status: :unauthorized
  622. }
  623. end
  624. end
  625. # check maintenance mode
  626. def check_maintenance_only(user)
  627. return false if Setting.get('maintenance_mode') != true
  628. return false if user.permissions?('admin.maintenance')
  629. Rails.logger.info "Maintenance mode enabled, denied login for user #{user.login}, it's no admin user."
  630. true
  631. end
  632. def check_maintenance(user)
  633. return false if !check_maintenance_only(user)
  634. raise Exceptions::NotAuthorized, 'Maintenance mode enabled!'
  635. end
  636. end