kanbanworkflowstimelinescrumrubyroadmapproject-planningproject-managementopenprojectangularissue-trackerifcgantt-chartganttbug-trackerboardsbcf
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
530 lines
16 KiB
530 lines
16 KiB
#-- copyright
|
|
# OpenProject is an open source project management software.
|
|
# Copyright (C) 2012-2023 the OpenProject GmbH
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License version 3.
|
|
#
|
|
# OpenProject is a fork of ChiliProject, which is a fork of Redmine. The copyright follows:
|
|
# Copyright (C) 2006-2013 Jean-Philippe Lang
|
|
# Copyright (C) 2010-2013 the ChiliProject Team
|
|
#
|
|
# This program is free software; you can redistribute it and/or
|
|
# modify it under the terms of the GNU General Public License
|
|
# as published by the Free Software Foundation; either version 2
|
|
# of the License, or (at your option) any later version.
|
|
#
|
|
# This program is distributed in the hope that it will be useful,
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
# GNU General Public License for more details.
|
|
#
|
|
# You should have received a copy of the GNU General Public License
|
|
# along with this program; if not, write to the Free Software
|
|
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
#
|
|
# See COPYRIGHT and LICENSE files for more details.
|
|
#++
|
|
|
|
class AccountController < ApplicationController
|
|
include CustomFieldsHelper
|
|
include OmniauthHelper
|
|
include Accounts::OmniauthLogin
|
|
include Accounts::UserConsent
|
|
include Accounts::UserLimits
|
|
include Accounts::UserPasswordChange
|
|
|
|
# prevents login action to be filtered by check_if_login_required application scope filter
|
|
skip_before_action :check_if_login_required
|
|
|
|
before_action :apply_csp_appends, only: %i[login]
|
|
before_action :disable_api
|
|
before_action :check_auth_source_sso_failure, only: :auth_source_sso_failed
|
|
|
|
layout 'no_menu'
|
|
|
|
# Login request and validation
|
|
def login
|
|
user = User.current
|
|
|
|
if user.logged?
|
|
redirect_after_login(user)
|
|
elsif omniauth_direct_login?
|
|
direct_login(user)
|
|
elsif request.post?
|
|
authenticate_user
|
|
end
|
|
end
|
|
|
|
# Log out current user and redirect to welcome page
|
|
def logout
|
|
# Keep attributes from the session
|
|
# to identify the user
|
|
previous_session = session.to_h.with_indifferent_access
|
|
previous_user = current_user
|
|
|
|
logout_user
|
|
|
|
perform_post_logout previous_session, previous_user
|
|
end
|
|
|
|
# Enable user to choose a new password
|
|
def lost_password
|
|
return redirect_to(home_url) unless allow_lost_password_recovery?
|
|
|
|
if params[:token]
|
|
@token = ::Token::Recovery.find_by_plaintext_value(params[:token])
|
|
redirect_to(home_url) && return unless @token and !@token.expired?
|
|
|
|
@user = @token.user
|
|
if request.post?
|
|
call = ::Users::ChangePasswordService.new(current_user: @user, session:).call(params)
|
|
call.apply_flash_message!(flash) if call.errors.empty?
|
|
|
|
if call.success?
|
|
@token.destroy
|
|
redirect_to action: 'login'
|
|
return
|
|
end
|
|
end
|
|
|
|
render template: 'account/password_recovery'
|
|
elsif request.post?
|
|
mail = params[:mail]
|
|
user = User.find_by_mail(mail) if mail.present?
|
|
|
|
# Ensure the same request is sent regardless of which email is entered
|
|
# to avoid detecability of mails
|
|
flash[:notice] = I18n.t(:notice_account_lost_email_sent)
|
|
|
|
unless user
|
|
# user not found in db
|
|
Rails.logger.error "Lost password unknown email input: #{mail}"
|
|
return
|
|
end
|
|
|
|
unless user.change_password_allowed?
|
|
# user uses an external authentication
|
|
Rails.logger.error "Password cannot be changed for user: #{mail}"
|
|
return
|
|
end
|
|
|
|
# create a new token for password recovery
|
|
token = Token::Recovery.new(user_id: user.id)
|
|
if token.save
|
|
UserMailer.password_lost(token).deliver_later
|
|
flash[:notice] = I18n.t(:notice_account_lost_email_sent)
|
|
redirect_to action: 'login', back_url: home_url
|
|
nil
|
|
end
|
|
end
|
|
end
|
|
|
|
# User self-registration
|
|
def register
|
|
return self_registration_disabled unless allow_registration?
|
|
|
|
@user = invited_user
|
|
|
|
if request.get?
|
|
registration_through_invitation!
|
|
else
|
|
if Setting.email_login?
|
|
params[:user][:login] = params[:user][:mail]
|
|
end
|
|
|
|
self_registration!
|
|
|
|
call_hook :user_registered, { user: @user } if @user.persisted?
|
|
end
|
|
end
|
|
|
|
def allow_registration?
|
|
allow = Setting::SelfRegistration.enabled? && !OpenProject::Configuration.disable_password_login?
|
|
|
|
invited = session[:invitation_token].present?
|
|
get = request.get? && allow
|
|
post = (request.post? || request.patch?) && (session[:auth_source_registration] || allow)
|
|
|
|
invited || get || post
|
|
end
|
|
|
|
def allow_lost_password_recovery?
|
|
Setting.lost_password? && !OpenProject::Configuration.disable_password_login?
|
|
end
|
|
|
|
# Token based account activation
|
|
def activate
|
|
token = ::Token::Invitation.find_by_plaintext_value(params[:token])
|
|
|
|
if token.nil? || token.user.nil?
|
|
invalid_token_and_redirect
|
|
elsif token.expired?
|
|
handle_expired_token token
|
|
elsif token.user.invited?
|
|
activate_by_invite_token token
|
|
elsif Setting::SelfRegistration.enabled?
|
|
activate_self_registered token
|
|
else
|
|
invalid_token_and_redirect
|
|
end
|
|
end
|
|
|
|
def handle_expired_token(token)
|
|
send_activation_email! token.user
|
|
|
|
flash[:warning] = I18n.t :warning_registration_token_expired, email: token.user.mail
|
|
|
|
redirect_to home_url
|
|
end
|
|
|
|
def send_activation_email!(user)
|
|
new_token = Token::Invitation.create!(user:)
|
|
UserMailer.user_signed_up(new_token).deliver_later
|
|
end
|
|
|
|
def activate_self_registered(token)
|
|
return if enforce_activation_user_limit(user: token.user)
|
|
|
|
user = token.user
|
|
|
|
if user.registered?
|
|
user.activate
|
|
|
|
if user.save
|
|
token.destroy
|
|
flash[:notice] = I18n.t(:notice_account_activated)
|
|
else
|
|
flash[:error] = I18n.t(:notice_activation_failed)
|
|
end
|
|
|
|
redirect_to signin_path
|
|
else
|
|
if user.active?
|
|
flash[:notice] = I18n.t(:notice_account_already_activated)
|
|
else
|
|
flash[:error] = I18n.t(:notice_activation_failed)
|
|
end
|
|
|
|
redirect_to home_url
|
|
end
|
|
end
|
|
|
|
def activate_by_invite_token(token)
|
|
return if enforce_activation_user_limit(user: token.user)
|
|
|
|
activate_invited token
|
|
end
|
|
|
|
def activate_invited(token)
|
|
session[:invitation_token] = token.value
|
|
user = token.user
|
|
|
|
if user.auth_source && user.auth_source.auth_method_name == 'LDAP'
|
|
activate_through_ldap user
|
|
else
|
|
activate_user user
|
|
end
|
|
end
|
|
|
|
def activate_user(user)
|
|
if omniauth_direct_login?
|
|
direct_login user
|
|
elsif OpenProject::Configuration.disable_password_login?
|
|
flash[:notice] = I18n.t('account.omniauth_login')
|
|
|
|
redirect_to signin_path
|
|
else
|
|
redirect_to account_register_path
|
|
end
|
|
end
|
|
|
|
def activate_through_ldap(user)
|
|
session[:auth_source_registration] = {
|
|
login: user.login,
|
|
auth_source_id: user.auth_source_id
|
|
}
|
|
|
|
flash[:notice] = I18n.t('account.auth_source_login', login: user.login).html_safe
|
|
|
|
redirect_to signin_path(username: user.login)
|
|
end
|
|
|
|
# Process a password change form, used when the user is forced
|
|
# to change the password.
|
|
# When making changes here, also check MyController.change_password
|
|
def change_password
|
|
# Retrieve user_id from session
|
|
@user = User.find(params[:password_change_user_id])
|
|
|
|
change_password_flow(user: @user, params:, show_user_name: true) do
|
|
password_authentication(@user.login, params[:new_password])
|
|
end
|
|
rescue ActiveRecord::RecordNotFound
|
|
Rails.logger.error "Failed to find user for change_password request: #{flash[:_password_change_user_id]}"
|
|
render_404
|
|
end
|
|
|
|
def auth_source_sso_failed
|
|
failure = session.delete :auth_source_sso_failure
|
|
login = failure[:login]
|
|
user = find_or_create_sso_user(login, save: false)
|
|
|
|
if user.try(:new_record?)
|
|
return onthefly_creation_failed user, login: user.login, auth_source_id: user.auth_source_id
|
|
end
|
|
|
|
show_sso_error_for user
|
|
|
|
flash.now[:error] = I18n.t(:error_auth_source_sso_failed, value: failure[:login]) +
|
|
": " + String(flash.now[:error])
|
|
|
|
render action: 'login', back_url: failure[:back_url]
|
|
end
|
|
|
|
private
|
|
|
|
def check_auth_source_sso_failure
|
|
redirect_to home_url unless session[:auth_source_sso_failure].present?
|
|
end
|
|
|
|
def show_sso_error_for(user)
|
|
if user.nil?
|
|
flash_and_log_invalid_credentials
|
|
elsif not user.active?
|
|
account_inactive user, flash_now: true
|
|
end
|
|
end
|
|
|
|
def registration_through_invitation!
|
|
session[:auth_source_registration] = nil
|
|
|
|
if @user.nil?
|
|
@user = assign_user_attributes({ language: Setting.default_language })
|
|
elsif user_with_placeholder_name?(@user)
|
|
@user.firstname = nil
|
|
@user.lastname = nil
|
|
end
|
|
end
|
|
|
|
def self_registration!
|
|
@user = assign_user_attributes({ admin: false, status: User.statuses[:registered] }) if @user.nil?
|
|
|
|
return if enforce_activation_user_limit(user: user_with_email(@user))
|
|
|
|
# Set consent if received from registration form
|
|
if consent_param?
|
|
@user.consented_at = DateTime.now
|
|
end
|
|
|
|
if session[:auth_source_registration]
|
|
register_with_auth_source(@user)
|
|
else
|
|
register_plain_user(@user)
|
|
end
|
|
end
|
|
|
|
def assign_user_attributes(attrs)
|
|
Users::SetAttributesService
|
|
.new(model: User.new, user: current_user, contract_class: EmptyContract)
|
|
.call(attrs)
|
|
.result
|
|
end
|
|
|
|
def register_plain_user(user)
|
|
user.attributes = permitted_params.user.transform_values do |val|
|
|
if val.is_a? String
|
|
val.strip!
|
|
end
|
|
|
|
val
|
|
end
|
|
user.login = params[:user][:login].strip if params[:user][:login].present?
|
|
user.password = params[:user][:password]
|
|
user.password_confirmation = params[:user][:password_confirmation]
|
|
|
|
respond_for_registered_user(user)
|
|
end
|
|
|
|
def register_with_auth_source(user)
|
|
# on-the-fly registration via omniauth or via auth source
|
|
if pending_omniauth_registration?
|
|
user.assign_attributes permitted_params.user_register_via_omniauth
|
|
register_via_omniauth(session, user.attributes)
|
|
else
|
|
user.attributes = permitted_params.user
|
|
user.activate
|
|
user.login = session[:auth_source_registration][:login]
|
|
user.auth_source_id = session[:auth_source_registration][:auth_source_id]
|
|
|
|
respond_for_registered_user(user)
|
|
end
|
|
end
|
|
|
|
def respond_for_registered_user(user)
|
|
call = ::Users::RegisterUserService.new(user).call
|
|
|
|
if call.success?
|
|
flash[:notice] = call.message.presence
|
|
login_user_if_active(call.result, just_registered: true)
|
|
else
|
|
flash[:error] = error = call.message
|
|
Rails.logger.error "Registration of user #{user.login} failed: #{error}"
|
|
onthefly_creation_failed(user)
|
|
end
|
|
end
|
|
|
|
def user_with_placeholder_name?(user)
|
|
user.firstname == user.login and user.login == user.mail
|
|
end
|
|
|
|
def direct_login(user)
|
|
if flash.empty?
|
|
ps = {}.tap do |p|
|
|
p[:origin] = params[:back_url] if params[:back_url]
|
|
end
|
|
|
|
redirect_to direct_login_provider_url(ps)
|
|
elsif Setting.login_required?
|
|
# I'm not sure why it is considered an error if we don't have the anonymous user here.
|
|
# Before the line read `user.active? || flash[:error]` but since a recent
|
|
# change the anonymous user is active too which breaks this.
|
|
error = !user.anonymous? || flash[:error]
|
|
instructions = error ? :after_error : :after_registration
|
|
|
|
render :exit, locals: { instructions: }
|
|
end
|
|
end
|
|
|
|
def authenticate_user
|
|
if OpenProject::Configuration.disable_password_login?
|
|
render_404
|
|
else
|
|
password_authentication(params[:username]&.strip, params[:password])
|
|
end
|
|
end
|
|
|
|
def password_authentication(username, password)
|
|
user = User.try_to_login(username, password, session)
|
|
if user.nil?
|
|
# login failed, now try to find out why and do the appropriate thing
|
|
user = User.find_by_login(username)
|
|
if user and user.check_password?(password)
|
|
# correct password
|
|
if not user.active?
|
|
account_inactive(user, flash_now: true)
|
|
elsif user.force_password_change
|
|
return if redirect_if_password_change_not_allowed(user)
|
|
|
|
render_password_change(user, I18n.t(:notice_account_new_password_forced), show_user_name: true)
|
|
elsif user.password_expired?
|
|
return if redirect_if_password_change_not_allowed(user)
|
|
|
|
render_password_change(user, I18n.t(:notice_account_password_expired, days: Setting.password_days_valid.to_i),
|
|
show_user_name: true)
|
|
else
|
|
flash_and_log_invalid_credentials
|
|
end
|
|
elsif user and user.invited?
|
|
invited_account_not_activated(user)
|
|
else
|
|
# incorrect password
|
|
flash_and_log_invalid_credentials
|
|
end
|
|
elsif user.new_record?
|
|
onthefly_creation_failed(user, login: user.login, auth_source_id: user.auth_source_id)
|
|
else
|
|
# Valid user
|
|
successful_authentication(user)
|
|
end
|
|
end
|
|
|
|
def login_user_if_active(user, just_registered:)
|
|
if user.active?
|
|
successful_authentication(user, just_registered:)
|
|
return
|
|
end
|
|
|
|
# Show an appropriate error unless
|
|
# the user was just registered
|
|
if !(just_registered && user.registered?)
|
|
account_inactive(user, flash_now: false)
|
|
end
|
|
|
|
redirect_to signin_path(back_url: params[:back_url])
|
|
end
|
|
|
|
def pending_auth_source_registration?
|
|
session[:auth_source_registration] && !pending_omniauth_registration?
|
|
end
|
|
|
|
def pending_omniauth_registration?
|
|
Hash(session[:auth_source_registration])[:omniauth]
|
|
end
|
|
|
|
# Onthefly creation failed, display the registration form to fill/fix attributes
|
|
def onthefly_creation_failed(user, auth_source_options = {})
|
|
@user = user
|
|
session[:auth_source_registration] = auth_source_options unless auth_source_options.empty?
|
|
render action: 'register'
|
|
end
|
|
|
|
def self_registration_disabled
|
|
flash[:error] = I18n.t('account.error_self_registration_disabled')
|
|
redirect_to signin_url
|
|
end
|
|
|
|
# Call if an account is inactive - either registered or locked
|
|
def account_inactive(user, flash_now: true)
|
|
if user.registered?
|
|
account_not_activated(flash_now:)
|
|
else
|
|
flash_and_log_invalid_credentials(flash_now:)
|
|
end
|
|
end
|
|
|
|
# Log an attempt to log in to an account in "registered" state and show a flash message.
|
|
def account_not_activated(flash_now: true)
|
|
flash_error_message(log_reason: 'NOT ACTIVATED', flash_now:) do
|
|
if Setting::SelfRegistration.by_email?
|
|
'account.error_inactive_activation_by_mail'
|
|
else
|
|
'account.error_inactive_manual_activation'
|
|
end
|
|
end
|
|
end
|
|
|
|
def invited_account_not_activated(_user)
|
|
flash_error_message(log_reason: 'invited, NOT ACTIVATED', flash_now: false) do
|
|
'account.error_inactive_activation_by_mail'
|
|
end
|
|
end
|
|
|
|
def invited_user
|
|
if session.include? :invitation_token
|
|
token = Token::Invitation.find_by_plaintext_value session[:invitation_token]
|
|
|
|
token.user
|
|
end
|
|
end
|
|
|
|
def disable_api
|
|
# Changing this to not use api_request? to determine whether a request is an API
|
|
# request can have security implications regarding CSRF. See handle_unverified_request
|
|
# for more information.
|
|
head :gone if api_request?
|
|
end
|
|
|
|
def invalid_token_and_redirect
|
|
flash[:error] = I18n.t(:notice_account_invalid_token)
|
|
|
|
redirect_to home_url
|
|
end
|
|
|
|
def apply_csp_appends
|
|
appends = flash[:_csp_appends]
|
|
return unless appends
|
|
|
|
append_content_security_policy_directives(appends)
|
|
end
|
|
end
|
|
|