application_controller.rb 9.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379
  1. # Copyright (C) 2012-2014 Zammad Foundation, http://zammad-foundation.org/
  2. class ApplicationController < ActionController::Base
  3. # http_basic_authenticate_with :name => "test", :password => "ttt"
  4. helper_method :current_user,
  5. :authentication_check,
  6. :authentication_check_action_token,
  7. :config_frontend,
  8. :is_role,
  9. :model_create_render,
  10. :model_update_render,
  11. :model_restory_render,
  12. :mode_show_rendeder,
  13. :model_index_render
  14. skip_before_filter :verify_authenticity_token
  15. before_filter :set_user, :session_update
  16. before_filter :cors_preflight_check
  17. after_filter :set_access_control_headers
  18. after_filter :trigger_events
  19. # For all responses in this controller, return the CORS access control headers.
  20. def set_access_control_headers
  21. headers['Access-Control-Allow-Origin'] = '*'
  22. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  23. headers['Access-Control-Max-Age'] = '1728000'
  24. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  25. headers['Access-Control-Allow-Credentials'] = 'true'
  26. end
  27. # If this is a preflight OPTIONS request, then short-circuit the
  28. # request, return only the necessary headers and return an empty
  29. # text/plain.
  30. def cors_preflight_check
  31. if request.method == 'OPTIONS'
  32. headers['Access-Control-Allow-Origin'] = '*'
  33. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  34. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  35. headers['Access-Control-Max-Age'] = '1728000'
  36. headers['Access-Control-Allow-Credentials'] = 'true'
  37. render text: '', content_type: 'text/plain'
  38. return false
  39. end
  40. end
  41. private
  42. # execute events
  43. def trigger_events
  44. Observer::Ticket::Notification.transaction
  45. end
  46. # Finds the User with the ID stored in the session with the key
  47. # :current_user_id This is a common way to handle user login in
  48. # a Rails application; logging in sets the session value and
  49. # logging out removes it.
  50. def current_user
  51. return @_current_user if @_current_user
  52. return if !session[:user_id]
  53. @_current_user = User.find( session[:user_id] )
  54. end
  55. def current_user_set(user)
  56. session[:user_id] = user.id
  57. @_current_user = user
  58. set_user
  59. end
  60. # Sets the current user into a named Thread location so that it can be accessed
  61. # by models and observers
  62. def set_user
  63. return if !current_user
  64. UserInfo.current_user_id = current_user.id
  65. end
  66. # update session updated_at
  67. def session_update
  68. #sleep 0.6
  69. # on many paralell requests, session got reinitialised if Time. is used, as workaround use DateTime.
  70. #session[:ping] = Time.now.utc.iso8601
  71. session[:ping] = DateTime.now.iso8601
  72. # check if remote ip need to be updated
  73. if !session[:remote_id] || session[:remote_id] != request.remote_ip
  74. session[:remote_id] = request.remote_ip
  75. session[:geo] = GeoIp.location( request.remote_ip )
  76. end
  77. # fill user agent
  78. if !session[:user_agent]
  79. session[:user_agent] = request.env['HTTP_USER_AGENT']
  80. end
  81. end
  82. def authentication_check_only
  83. #puts 'authentication_check'
  84. session[:request_type] = 1
  85. #puts params.inspect
  86. #puts session.inspect
  87. #puts cookies.inspect
  88. # check http basic auth
  89. authenticate_with_http_basic do |username, password|
  90. #puts 'http basic auth check'
  91. session[:request_type] = 2
  92. userdata = User.authenticate( username, password )
  93. message = ''
  94. if !userdata
  95. message = 'authentication failed'
  96. end
  97. # return auth ok
  98. if message == ''
  99. # remember user
  100. session[:user_id] = userdata.id
  101. # set basic auth user to current user
  102. current_user_set(userdata)
  103. return {
  104. auth: true
  105. }
  106. end
  107. # return auth not ok
  108. return {
  109. auth: false,
  110. message: message,
  111. }
  112. end
  113. # check logon session
  114. if params['logon_session']
  115. logon_session = ActiveRecord::SessionStore::Session.where( session_id: params['logon_session'] ).first
  116. if logon_session
  117. userdata = User.find( logon_session.data[:user_id] )
  118. end
  119. session[:request_type] = 3
  120. # set logon session user to current user
  121. current_user_set(userdata)
  122. return {
  123. auth: true
  124. }
  125. end
  126. # check sso
  127. if !session[:user_id]
  128. user = User.sso(params)
  129. # Log the authorizing user in.
  130. if user
  131. session[:user_id] = user.id
  132. end
  133. end
  134. # return auth not ok (no session exists)
  135. if !session[:user_id]
  136. puts 'no valid session, user_id'
  137. message = 'no valid session, user_id'
  138. return {
  139. auth: false,
  140. message: message,
  141. }
  142. end
  143. return {
  144. auth: true
  145. }
  146. end
  147. def authentication_check
  148. result = authentication_check_only
  149. # return auth not ok
  150. if result[:auth] == false
  151. render(
  152. json: {
  153. error: result[:message],
  154. },
  155. status: :unauthorized
  156. )
  157. return false
  158. end
  159. # return auth ok
  160. true
  161. end
  162. def authentication_check_action_token(action)
  163. user = Token.check(
  164. action: action,
  165. name: params[:action_token],
  166. )
  167. if !user
  168. puts params.inspect
  169. response_access_deny
  170. return
  171. end
  172. current_user_set( user )
  173. true
  174. end
  175. def is_role( role_name )
  176. return false if !current_user
  177. return true if current_user.is_role( role_name )
  178. false
  179. end
  180. def ticket_permission(ticket)
  181. return true if ticket.permission( current_user: current_user )
  182. response_access_deny
  183. false
  184. end
  185. def is_not_role( role_name )
  186. deny_if_not_role( role_name )
  187. end
  188. def deny_if_not_role( role_name )
  189. return false if is_role( role_name )
  190. response_access_deny
  191. true
  192. end
  193. def valid_session_with_user
  194. return true if current_user
  195. render json: { message: 'No session user!' }, status: :unprocessable_entity
  196. false
  197. end
  198. def response_access_deny
  199. render(
  200. json: {},
  201. status: :unauthorized
  202. )
  203. false
  204. end
  205. def config_frontend
  206. # config
  207. config = {}
  208. Setting.select('name').where( frontend: true ).each { |setting|
  209. config[setting.name] = Setting.get(setting.name)
  210. }
  211. # get all time zones
  212. config['timezones'] = {}
  213. TZInfo::Timezone.all.each { |t|
  214. # ignore the following time zones
  215. next if t.name =~ /^GMT/
  216. next if t.name =~ /^Etc/
  217. next if t.name =~ /^MET/
  218. next if t.name =~ /^MST/
  219. next if t.name =~ /^ROC/
  220. next if t.name =~ /^ROK/
  221. diff = t.current_period.utc_total_offset / 60 /60
  222. config['timezones'][ t.name ] = diff
  223. }
  224. if session[:switched_from_user_id]
  225. config['switch_back_to_possible'] = true
  226. end
  227. config
  228. end
  229. # model helper
  230. def model_create_render (object, params)
  231. begin
  232. # create object
  233. generic_object = object.new( object.param_cleanup( params[object.to_app_model_url], true ) )
  234. # save object
  235. generic_object.save!
  236. # set relations
  237. generic_object.param_set_associations( params )
  238. model_create_render_item(generic_object)
  239. rescue Exception => e
  240. puts e.message.inspect
  241. logger.error e.message
  242. logger.error e.backtrace.inspect
  243. render json: { error: e.message }, status: :unprocessable_entity
  244. end
  245. end
  246. def model_create_render_item (generic_object)
  247. render json: generic_object.attributes_with_associations, status: :created
  248. end
  249. def model_update_render (object, params)
  250. begin
  251. # find object
  252. generic_object = object.find( params[:id] )
  253. # save object
  254. generic_object.update_attributes!( object.param_cleanup( params[object.to_app_model_url] ) )
  255. # set relations
  256. generic_object.param_set_associations( params )
  257. model_update_render_item( generic_object )
  258. rescue Exception => e
  259. logger.error e.message
  260. logger.error e.backtrace.inspect
  261. render json: { error: e.message }, status: :unprocessable_entity
  262. end
  263. end
  264. def model_update_render_item (generic_object)
  265. render json: generic_object.attributes_with_associations, status: :ok
  266. end
  267. def model_destory_render (object, params)
  268. begin
  269. generic_object = object.find( params[:id] )
  270. generic_object.destroy
  271. model_destory_render_item()
  272. rescue Exception => e
  273. logger.error e.message
  274. logger.error e.backtrace.inspect
  275. render json: { error: e.message }, status: :unprocessable_entity
  276. end
  277. end
  278. def model_destory_render_item ()
  279. render json: {}, status: :ok
  280. end
  281. def model_show_render (object, params)
  282. begin
  283. if params[:full]
  284. generic_object_full = object.full( params[:id] )
  285. render json: generic_object_full, status: :ok
  286. return
  287. end
  288. generic_object = object.find( params[:id] )
  289. model_show_render_item(generic_object)
  290. rescue Exception => e
  291. logger.error e.message
  292. logger.error e.backtrace.inspect
  293. render json: { error: e.message }, status: :unprocessable_entity
  294. end
  295. end
  296. def model_show_render_item (generic_object)
  297. render json: generic_object.attributes_with_associations, status: :ok
  298. end
  299. def model_index_render (object, params)
  300. begin
  301. generic_objects = object.all
  302. model_index_render_result( generic_objects )
  303. rescue Exception => e
  304. logger.error e.message
  305. logger.error e.backtrace.inspect
  306. render json: { error: e.message }, status: :unprocessable_entity
  307. end
  308. end
  309. def model_index_render_result (generic_objects)
  310. render json: generic_objects, status: :ok
  311. end
  312. end