123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352 |
- # Copyright (C) 2012-2024 Zammad Foundation, https://zammad-foundation.org/
- class SessionsController < ApplicationController
- prepend_before_action :authenticate_and_authorize!, only: %i[switch_to_user list delete]
- skip_before_action :verify_csrf_token, only: %i[show destroy create_omniauth failure_omniauth saml_destroy]
- skip_before_action :user_device_log, only: %i[create_sso create_omniauth]
- def show
- user = authentication_check_only
- raise Exceptions::NotAuthorized, 'no valid session' if user.blank?
- # return current session
- render json: SessionHelper.json_hash(user).merge(config: config_frontend, after_auth: Auth::AfterAuth.run(user, session))
- rescue Exceptions::NotAuthorized => e
- render json: SessionHelper.json_hash_error(e).merge(config: config_frontend)
- end
- # "Create" a login, aka "log the user in"
- def create
- user = authenticate_with_password
- initiate_session_for(user)
- # return new session data
- render status: :created,
- json: SessionHelper.json_hash(user).merge(config: config_frontend, after_auth: Auth::AfterAuth.run(user, session))
- rescue Auth::Error::TwoFactorRequired => e
- render json: {
- two_factor_required: {
- default_two_factor_authentication_method: e.default_two_factor_authentication_method,
- available_two_factor_authentication_methods: e.available_two_factor_authentication_methods,
- recovery_codes_available: e.recovery_codes_available
- }
- }, status: :unprocessable_entity
- rescue Auth::Error::Base => e
- raise Exceptions::NotAuthorized, e.message
- end
- def create_sso
- raise Exceptions::Forbidden, 'SSO authentication disabled!' if !Setting.get('auth_sso')
- user = begin
- login = request.env['REMOTE_USER'] ||
- request.env['HTTP_REMOTE_USER'] ||
- request.headers['X-Forwarded-User']
- User.lookup(login: login&.downcase)
- end
- raise Exceptions::NotAuthorized, __("Neither an SSO environment variable 'REMOTE_USER' nor a 'X-Forwarded-User' header could be found.") if login.blank?
- raise Exceptions::NotAuthorized, "User '#{login}' could not be found." if user.blank?
- session.delete(:switched_from_user_id)
- authentication_check_prerequesits(user, 'SSO')
- initiate_session_for(user, 'SSO')
- redirect_to '/#'
- end
- # "Delete" a login, aka "log the user out"
- def destroy
- if %w[test development].include?(Rails.env) && ENV['FAKE_SELENIUM_LOGIN_USER_ID'].present?
- ENV['FAKE_SELENIUM_LOGIN_USER_ID'] = nil # rubocop:disable Rails/EnvironmentVariableAccess
- ENV['FAKE_SELENIUM_LOGIN_PENDING'] = nil # rubocop:disable Rails/EnvironmentVariableAccess
- end
- if (session['saml_uid'] || session['saml_session_index']) && OmniAuth::Strategies::SamlDatabase.setup.fetch('idp_slo_service_url', nil)
- begin
- return saml_destroy
- rescue => e
- Rails.logger.error "SAML SLO failed: #{e.message}"
- end
- end
- reset_session
- # Remove the user id from the session
- @_current_user = nil
- # reset session
- request.env['rack.session.options'][:expire_after] = nil
- render json: {}
- end
- def create_omniauth
- # in case, remove switched_from_user_id
- session[:switched_from_user_id] = nil
- auth = request.env['omniauth.auth']
- redirect_url = if request.env['omniauth.origin']&.include?('/mobile')
- '/mobile'
- elsif request.env['omniauth.origin']&.include?('/desktop')
- '/desktop'
- else
- '/#'
- end
- if !auth
- logger.info('AUTH IS NULL, SERVICE NOT LINKED TO ACCOUNT')
- # redirect to app
- redirect_to redirect_url
- return
- end
- # Create a new user or add an auth to existing user, depending on
- # whether there is already a user signed in.
- authorization = Authorization.find_from_hash(auth)
- if !authorization
- authorization = Authorization.create_from_hash(auth, current_user)
- end
- if in_maintenance_mode?(authorization.user)
- redirect_to redirect_url
- return
- end
- # set current session user
- current_user_set(authorization.user)
- # log new session
- authorization.user.activity_stream_log('session started', authorization.user.id, true)
- # remember last login date
- authorization.user.update_last_login
- # remember omnitauth login
- session[:authentication_type] = 'omniauth'
- # Set needed fingerprint parameter.
- if request.env['omniauth.params']['fingerprint'].present?
- params[:fingerprint] = request.env['omniauth.params']['fingerprint']
- user_device_log(authorization.user, 'session')
- end
- # redirect to app
- redirect_to redirect_url
- rescue Authorization::Provider::AccountError => e
- forbidden(e)
- end
- def failure_omniauth
- raise Exceptions::UnprocessableEntity, "Message from #{params[:strategy]}: #{params[:message]}"
- end
- # "switch" to user
- def switch_to_user
- # check user
- if !params[:id]
- render(
- json: { message: 'no user given' },
- status: :not_found
- )
- return false
- end
- user = User.find(params[:id])
- if !user
- render(
- json: {},
- status: :not_found
- )
- return false
- end
- # remember original user
- session[:switched_from_user_id] ||= current_user.id
- # log new session
- user.activity_stream_log('switch to', current_user.id, true)
- # set session user
- current_user_set(user)
- render(
- json: {
- success: true,
- location: '',
- },
- )
- end
- # "switch" back to user
- def switch_back_to_user
- # check if it's a switch back
- raise Exceptions::Forbidden if !session[:switched_from_user_id]
- user = User.lookup(id: session[:switched_from_user_id])
- if !user
- render(
- json: {},
- status: :not_found
- )
- return false
- end
- # remember current user
- current_session_user = current_user
- # remove switched_from_user_id
- session[:switched_from_user_id] = nil
- # set old session user again
- current_user_set(user)
- # log end session
- current_session_user.activity_stream_log('ended switch to', user.id, true)
- render(
- json: {
- success: true,
- location: '',
- },
- )
- end
- def available
- render json: {
- app_version: AppVersion.get
- }
- end
- def list
- assets = {}
- sessions_clean = []
- SessionHelper.list.each do |session|
- next if session.data['user_id'].blank?
- sessions_clean.push session
- user = User.lookup(id: session.data['user_id'])
- next if !user
- assets = user.assets(assets)
- end
- render json: {
- sessions: sessions_clean,
- assets: assets,
- }
- end
- def delete
- SessionHelper.destroy(params[:id])
- render json: {}
- end
- def two_factor_authentication_method_initiate_authentication
- %i[username password method].each do |param|
- raise Exceptions::UnprocessableEntity, "The required parameter '#{param}' is missing." if params[param].blank?
- end
- auth = Auth.new(params[:username], params[:password], only_verify_password: true)
- begin
- auth.valid!
- rescue Auth::Error::AuthenticationFailed
- raise Exceptions::UnprocessableEntity, __('The username or password is incorrect.')
- end
- two_factor_method = auth.user.auth_two_factor.authentication_method_object(params[:method])
- raise Exceptions::UnprocessableEntity, __('The two-factor authentication method is not enabled.') if !two_factor_method&.enabled? || !two_factor_method&.available?
- render json: two_factor_method.initiate_authentication, status: :ok
- end
- private
- def authenticate_with_password
- auth = Auth.new(params[:username], params[:password],
- two_factor_method: params[:two_factor_method], two_factor_payload: params[:two_factor_payload])
- auth.valid!
- session.delete(:switched_from_user_id)
- authentication_check_prerequesits(auth.user, 'session')
- end
- def initiate_session_for(user, type = 'password')
- request.env['rack.session.options'][:expire_after] = 1.year if params[:remember_me]
- # Mark the session as "persistent". Non-persistent sessions (e.g. sessions generated by curl API call) are
- # deleted periodically in SessionHelper.cleanup_expired.
- session[:persistent] = true
- session[:authentication_type] = type
- user.activity_stream_log('session started', user.id, true)
- end
- def config_frontend
- # config
- config = {}
- Setting.select('name, preferences').where(frontend: true).each do |setting|
- next if setting.preferences[:authentication] == true && !current_user
- value = Setting.get(setting.name)
- next if !current_user && (value == false || value.nil?)
- config[setting.name] = value
- end
- # NB: Explicitly include SAML display name config
- # This is needed because the setting is not frontend related,
- # but we still to display one of the options
- # https://github.com/zammad/zammad/issues/4263
- config['auth_saml_display_name'] = Setting.get('auth_saml_credentials')[:display_name]
- # Include the flag for JSON column type support (currently only on PostgreSQL backend).
- config['column_type_json_supported'] =
- ActiveRecord::Base.connection_db_config.configuration_hash[:adapter] == 'postgresql'
- # Announce searchable models to the front end.
- config['models_searchable'] = Models.searchable.map(&:to_s)
- # remember if we can switch back to user
- if session[:switched_from_user_id]
- config['switch_back_to_possible'] = true
- end
- # remember session_id for websocket logon
- if current_user
- config['session_id'] = session.id.public_id
- end
- config['core_workflow_config'] = CoreWorkflow.config
- config['icons_url'] = icons_url
- config
- end
- def saml_destroy
- options = OmniAuth::Strategies::SamlDatabase.setup
- settings = OneLogin::RubySaml::Settings.new(options)
- logout_request = OneLogin::RubySaml::Logoutrequest.new
- # Since we created a new SAML request, save the transaction_id
- # to compare it with the response we get back
- session['saml_transaction_id'] = logout_request.uuid
- settings.name_identifier_value = session['saml_uid']
- settings.sessionindex = session['saml_session_index']
- url = logout_request.create(settings)
- render json: { url: url }
- end
- end
|