application_controller.rb 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417
  1. # Copyright (C) 2012-2014 Zammad Foundation, http://zammad-foundation.org/
  2. class ApplicationController < ActionController::Base
  3. # http_basic_authenticate_with :name => "test", :password => "ttt"
  4. helper_method :current_user,
  5. :authentication_check,
  6. :config_frontend,
  7. :role?,
  8. :model_create_render,
  9. :model_update_render,
  10. :model_restory_render,
  11. :mode_show_rendeder,
  12. :model_index_render
  13. skip_before_action :verify_authenticity_token
  14. before_action :set_user, :session_update
  15. before_action :cors_preflight_check
  16. after_action :user_device_update, :set_access_control_headers
  17. after_action :trigger_events
  18. # For all responses in this controller, return the CORS access control headers.
  19. def set_access_control_headers
  20. headers['Access-Control-Allow-Origin'] = '*'
  21. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  22. headers['Access-Control-Max-Age'] = '1728000'
  23. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  24. headers['Access-Control-Allow-Credentials'] = 'true'
  25. end
  26. # If this is a preflight OPTIONS request, then short-circuit the
  27. # request, return only the necessary headers and return an empty
  28. # text/plain.
  29. def cors_preflight_check
  30. return if request.method != 'OPTIONS'
  31. headers['Access-Control-Allow-Origin'] = '*'
  32. headers['Access-Control-Allow-Methods'] = 'POST, GET, PUT, DELETE, OPTIONS'
  33. headers['Access-Control-Allow-Headers'] = 'Content-Type, Depth, User-Agent, X-File-Size, X-Requested-With, If-Modified-Since, X-File-Name, Cache-Control, Accept-Language'
  34. headers['Access-Control-Max-Age'] = '1728000'
  35. headers['Access-Control-Allow-Credentials'] = 'true'
  36. render text: '', content_type: 'text/plain'
  37. false
  38. end
  39. private
  40. # execute events
  41. def trigger_events
  42. Observer::Ticket::Notification.transaction
  43. end
  44. # Finds the User with the ID stored in the session with the key
  45. # :current_user_id This is a common way to handle user login in
  46. # a Rails application; logging in sets the session value and
  47. # logging out removes it.
  48. def current_user
  49. return @_current_user if @_current_user
  50. return if !session[:user_id]
  51. @_current_user = User.lookup(id: session[:user_id])
  52. end
  53. def current_user_set(user)
  54. session[:user_id] = user.id
  55. @_current_user = user
  56. set_user
  57. end
  58. # Sets the current user into a named Thread location so that it can be accessed
  59. # by models and observers
  60. def set_user
  61. return if !current_user
  62. UserInfo.current_user_id = current_user.id
  63. end
  64. # update session updated_at
  65. def session_update
  66. #sleep 0.6
  67. session[:ping] = Time.zone.now.iso8601
  68. # check if remote ip need to be updated
  69. if !session[:remote_ip] || session[:remote_ip] != request.remote_ip
  70. session[:remote_ip] = request.remote_ip
  71. session[:geo] = Service::GeoIp.location(request.remote_ip)
  72. end
  73. # fill user agent
  74. return if session[:user_agent]
  75. session[:user_agent] = request.env['HTTP_USER_AGENT']
  76. end
  77. # user device recent action update
  78. def user_device_update
  79. # return if we are in switch to user mode
  80. return if session[:switched_from_user_id]
  81. # only if user_id exists
  82. return if !session[:user_id]
  83. # only with user device
  84. if !session[:user_device_id]
  85. if params[:fingerprint]
  86. return false if !user_device_log(current_user, 'session')
  87. end
  88. return
  89. end
  90. # check if entry exists / only if write action
  91. diff = Time.zone.now - 10.minutes
  92. method = request.method
  93. if method == 'GET' || method == 'OPTIONS' || method == 'HEAD'
  94. diff = Time.zone.now - 30.minutes
  95. end
  96. # only update if needed
  97. return if session[:user_device_update_at] && session[:user_device_update_at] > diff
  98. session[:user_device_update_at] = Time.zone.now
  99. UserDevice.action(
  100. session[:user_device_id],
  101. session[:user_agent],
  102. session[:remote_ip],
  103. session[:user_id],
  104. )
  105. end
  106. def user_device_log(user, type)
  107. # return if we are in switch to user mode
  108. return true if session[:switched_from_user_id]
  109. # for sessions we need the fingperprint
  110. if !params[:fingerprint] && type == 'session'
  111. render json: { error: 'Need fingerprint param!' }, status: :unprocessable_entity
  112. return false
  113. end
  114. # add device if needed
  115. user_device = UserDevice.add(
  116. request.env['HTTP_USER_AGENT'],
  117. request.remote_ip,
  118. user.id,
  119. params[:fingerprint],
  120. type,
  121. )
  122. session[:user_device_id] = user_device.id
  123. end
  124. def authentication_check_only(auth_param)
  125. #logger.debug 'authentication_check'
  126. #logger.debug params.inspect
  127. #logger.debug session.inspect
  128. #logger.debug cookies.inspect
  129. # already logged in, early exit
  130. if session.id && session[:user_id]
  131. logger.debug 'session based auth check'
  132. userdata = User.lookup(id: session[:user_id])
  133. current_user_set(userdata)
  134. logger.debug "session based auth for '#{userdata.login}'"
  135. return {
  136. auth: true
  137. }
  138. end
  139. error_message = 'authentication failed'
  140. # check sso based authentication
  141. sso_userdata = User.sso(params)
  142. if sso_userdata
  143. session[:persistent] = true
  144. return {
  145. auth: true
  146. }
  147. end
  148. # check http basic based authentication
  149. authenticate_with_http_basic do |username, password|
  150. logger.debug "http basic auth check '#{username}'"
  151. userdata = User.authenticate(username, password)
  152. next if !userdata
  153. current_user_set(userdata)
  154. user_device_log(userdata, 'basic_auth')
  155. logger.debug "http basic auth for '#{userdata.login}'"
  156. return {
  157. auth: true
  158. }
  159. end
  160. # check http token based authentication
  161. if auth_param[:token_action]
  162. authenticate_with_http_token do |token, _options|
  163. logger.debug "token auth check '#{token}'"
  164. userdata = Token.check(
  165. action: auth_param[:token_action],
  166. name: token,
  167. )
  168. next if !userdata
  169. current_user_set(userdata)
  170. user_device_log(userdata, 'token_auth')
  171. logger.debug "token auth for '#{userdata.login}'"
  172. return {
  173. auth: true
  174. }
  175. end
  176. end
  177. logger.debug error_message
  178. {
  179. auth: false,
  180. message: error_message,
  181. }
  182. end
  183. def authentication_check(auth_param = {} )
  184. result = authentication_check_only(auth_param)
  185. # check if basic_auth fallback is possible
  186. if auth_param[:basic_auth_promt] && result[:auth] == false
  187. return request_http_basic_authentication
  188. end
  189. # return auth not ok
  190. if result[:auth] == false
  191. render(
  192. json: {
  193. error: result[:message],
  194. },
  195. status: :unauthorized
  196. )
  197. return false
  198. end
  199. # return auth ok
  200. true
  201. end
  202. def role?(role_name)
  203. return false if !current_user
  204. current_user.role?(role_name)
  205. end
  206. def ticket_permission(ticket)
  207. return true if ticket.permission(current_user: current_user)
  208. response_access_deny
  209. false
  210. end
  211. def deny_if_not_role(role_name)
  212. return false if role?(role_name)
  213. response_access_deny
  214. true
  215. end
  216. def valid_session_with_user
  217. return true if current_user
  218. render json: { message: 'No session user!' }, status: :unprocessable_entity
  219. false
  220. end
  221. def response_access_deny
  222. render(
  223. json: {},
  224. status: :unauthorized
  225. )
  226. false
  227. end
  228. def config_frontend
  229. # config
  230. config = {}
  231. Setting.select('name').where(frontend: true ).each { |setting|
  232. config[setting.name] = Setting.get(setting.name)
  233. }
  234. # remember if we can to swich back to user
  235. if session[:switched_from_user_id]
  236. config['switch_back_to_possible'] = true
  237. end
  238. # remember session_id for websocket logon
  239. config['session_id'] = session.id
  240. config
  241. end
  242. # model helper
  243. def model_create_render (object, params)
  244. # create object
  245. generic_object = object.new(object.param_cleanup(params[object.to_app_model_url], true ))
  246. # save object
  247. generic_object.save!
  248. # set relations
  249. generic_object.param_set_associations(params)
  250. model_create_render_item(generic_object)
  251. rescue => e
  252. logger.error e.message
  253. logger.error e.backtrace.inspect
  254. render json: model_match_error(e.message), status: :unprocessable_entity
  255. end
  256. def model_create_render_item (generic_object)
  257. render json: generic_object.attributes_with_associations, status: :created
  258. end
  259. def model_update_render (object, params)
  260. # find object
  261. generic_object = object.find(params[:id])
  262. # save object
  263. generic_object.update_attributes!(object.param_cleanup(params[object.to_app_model_url]))
  264. # set relations
  265. generic_object.param_set_associations(params)
  266. model_update_render_item(generic_object)
  267. rescue => e
  268. logger.error e.message
  269. logger.error e.backtrace.inspect
  270. render json: model_match_error(e.message), status: :unprocessable_entity
  271. end
  272. def model_update_render_item (generic_object)
  273. render json: generic_object.attributes_with_associations, status: :ok
  274. end
  275. def model_destory_render (object, params)
  276. generic_object = object.find(params[:id])
  277. generic_object.destroy
  278. model_destory_render_item()
  279. rescue => e
  280. logger.error e.message
  281. logger.error e.backtrace.inspect
  282. render json: model_match_error(e.message), status: :unprocessable_entity
  283. end
  284. def model_destory_render_item ()
  285. render json: {}, status: :ok
  286. end
  287. def model_show_render (object, params)
  288. if params[:full]
  289. generic_object_full = object.full(params[:id])
  290. render json: generic_object_full, status: :ok
  291. return
  292. end
  293. generic_object = object.find(params[:id])
  294. model_show_render_item(generic_object)
  295. rescue => e
  296. logger.error e.message
  297. logger.error e.backtrace.inspect
  298. render json: model_match_error(e.message), status: :unprocessable_entity
  299. end
  300. def model_show_render_item (generic_object)
  301. render json: generic_object.attributes_with_associations, status: :ok
  302. end
  303. def model_index_render (object, _params)
  304. generic_objects = object.all
  305. if params[:full]
  306. assets = {}
  307. item_ids = []
  308. generic_objects.each {|item|
  309. item_ids.push item.id
  310. assets = item.assets(assets)
  311. }
  312. render json: {
  313. record_ids: item_ids,
  314. assets: assets,
  315. }, status: :ok
  316. return
  317. end
  318. generic_objects_with_associations = []
  319. generic_objects.each {|item|
  320. generic_objects_with_associations.push item.attributes_with_associations
  321. }
  322. model_index_render_result(generic_objects_with_associations)
  323. rescue => e
  324. logger.error e.message
  325. logger.error e.backtrace.inspect
  326. render json: model_match_error(e.message), status: :unprocessable_entity
  327. end
  328. def model_index_render_result (generic_objects)
  329. render json: generic_objects, status: :ok
  330. end
  331. def model_match_error (error)
  332. data = {
  333. error: error
  334. }
  335. if error =~ /(already exists|duplicate key|duplicate entry)/i
  336. data[:error_human] = 'Object already exists!'
  337. end
  338. data
  339. end
  340. end