Files
astuto/app/controllers/o_auths_controller.rb

188 lines
5.3 KiB
Ruby
Raw Normal View History

class OAuthsController < ApplicationController
include HTTParty
include OAuthsHelper
include ApplicationHelper
before_action :authenticate_admin, only: [:index, :create, :update, :destroy]
TOKEN_STATE_SEPARATOR = '-'
2024-01-22 14:45:48 +01:00
# [subdomain.]base_url/o_auths/:id/start?reason=login|test|tenantsignup
# Generates authorize url with required parameters and redirects to provider
def start
2024-01-22 14:45:48 +01:00
@o_auth = OAuth.unscoped.include_defaults.find(params[:id])
return if params[:reason] != 'test' and not @o_auth.is_enabled?
# Generate random state + other query params
2024-01-22 14:45:48 +01:00
tenant_domain = Current.tenant ? Current.tenant_or_raise!.subdomain : "null"
token_state = "#{params[:reason]}#{TOKEN_STATE_SEPARATOR}#{tenant_domain}#{TOKEN_STATE_SEPARATOR}#{Devise.friendly_token(30)}"
cookies[:token_state] = { value: token_state, domain: ".#{request.domain}", httponly: true }
@o_auth.state = token_state
redirect_to @o_auth.authorize_url_with_query_params
end
# [subdomain.]base_url/o_auths/:id/callback
# Exchange authorization code for access token, fetch user info and sign in/up
def callback
2024-01-22 14:45:48 +01:00
reason, tenant_domain, token_state = params[:state].split(TOKEN_STATE_SEPARATOR, 3)
return unless cookies[:token_state] == params[:state]
cookies.delete(:token_state, domain: ".#{request.domain}")
2024-01-22 14:45:48 +01:00
@o_auth = OAuth.unscoped.include_defaults.find(params[:id])
2024-01-22 14:45:48 +01:00
return if reason != 'test' and not @o_auth.is_enabled?
# If it is a default OAuth we need to set the tenant
if @o_auth.is_default?
Current.tenant = Tenant.find_by(subdomain: tenant_domain)
end
user_profile = OAuthExchangeAuthCodeForProfile.new(
authorization_code: params[:code],
o_auth: @o_auth
).run
2024-01-22 14:45:48 +01:00
if reason == 'login'
user = OAuthSignInUser.new(
user_profile: user_profile,
o_auth: @o_auth
).run
if user
2024-01-22 14:45:48 +01:00
oauth_token = user.generate_oauth_token
redirect_to add_subdomain_to(method(:o_auth_sign_in_from_oauth_token_url), nil, {user_id: user.id, token: oauth_token})
else
flash[:alert] = I18n.t('errors.o_auth_login_error', name: @o_auth.name)
2024-01-22 14:45:48 +01:00
redirect_to add_subdomain_to(method(:new_user_session_url))
end
2024-01-22 14:45:48 +01:00
elsif reason == 'test'
2024-01-22 14:45:48 +01:00
unless user_signed_in? and current_user.admin?
flash[:alert] = I18n.t('errors.unauthorized')
redirect_to root_url
return
end
@user_profile = user_profile
2024-01-22 14:45:48 +01:00
@user_email = query_path_from_object(user_profile, @o_auth.json_user_email_path)
@email_valid = URI::MailTo::EMAIL_REGEXP.match?(@user_email)
2024-01-22 14:45:48 +01:00
if not @o_auth.json_user_name_path.blank?
@user_name = query_path_from_object(user_profile, @o_auth.json_user_name_path)
@name_valid = !@user_name.nil?
end
render 'o_auths/test', layout: false
2024-01-22 14:45:48 +01:00
elsif reason == 'tenantsignup'
@o_auths = []
@user_email = query_path_from_object(user_profile, @o_auth.json_user_email_path)
if not @o_auth.json_user_name_path.blank?
@user_name = query_path_from_object(user_profile, @o_auth.json_user_name_path)
end
@o_auth_login_completed = true
session[:o_auth_sign_up] = "#{@user_email},#{@user_name}"
render 'tenants/new'
else
2024-01-22 14:45:48 +01:00
flash[:alert] = I18n.t('errors.unknown')
redirect_to root_url
2024-01-22 14:45:48 +01:00
end
end
# [subdomain.]base_url/o_auths/sign_in_from_oauth_token?user_id=<id>&token=<token>
# Used for OAuth with reason 'login'
# It has been introduced because of default OAuth providers,
# since they must redirect to a common domain for all tenants.
def sign_in_from_oauth_token
return unless params[:user_id] and params[:token]
user = User.find(params[:user_id])
if user.oauth_token == params[:token]
sign_in user
user.invalidate_oauth_token
flash[:notice] = I18n.t('devise.sessions.signed_in')
redirect_to root_path
else
flash[:alert] = I18n.t('errors.o_auth_login_error', name: @o_auth.name)
redirect_to new_user_session_path
end
end
### CRUD actions ###
def index
authorize OAuth
2024-01-22 14:45:48 +01:00
@o_auths = OAuth.include_defaults.order(created_at: :asc)
render json: to_json_custom(@o_auths)
end
def create
@o_auth = OAuth.new
@o_auth.assign_attributes(o_auth_params)
authorize @o_auth
if @o_auth.save
render json: to_json_custom(@o_auth), status: :created
else
render json: {
error: @o_auth.errors.full_messages
}, status: :unprocessable_entity
end
end
def update
@o_auth = OAuth.find(params[:id])
authorize @o_auth
if @o_auth.update(o_auth_params)
render json: to_json_custom(@o_auth)
else
render json: {
error: @o_auth.errors.full_messages
}, status: :unprocessable_entity
end
end
def destroy
@o_auth = OAuth.find(params[:id])
authorize @o_auth
if @o_auth.destroy
render json: {
id: params[:id]
}, status: :accepted
else
render json: {
error: @o_auth.errors.full_messages
}, status: :unprocessable_entity
end
end
private
def to_json_custom(o_auth)
o_auth.as_json(
methods: :callback_url,
except: [:client_secret]
)
end
def o_auth_params
params
.require(:o_auth)
.permit(policy(@o_auth).permitted_attributes)
end
end