You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

account_controller.rb 16KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489
  1. # frozen_string_literal: true
  2. # Redmine - project management software
  3. # Copyright (C) 2006-2021 Jean-Philippe Lang
  4. #
  5. # This program is free software; you can redistribute it and/or
  6. # modify it under the terms of the GNU General Public License
  7. # as published by the Free Software Foundation; either version 2
  8. # of the License, or (at your option) any later version.
  9. #
  10. # This program is distributed in the hope that it will be useful,
  11. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. # GNU General Public License for more details.
  14. #
  15. # You should have received a copy of the GNU General Public License
  16. # along with this program; if not, write to the Free Software
  17. # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  18. class AccountController < ApplicationController
  19. helper :custom_fields
  20. include CustomFieldsHelper
  21. self.main_menu = false
  22. # prevents login action to be filtered by check_if_login_required application scope filter
  23. skip_before_action :check_if_login_required, :check_password_change
  24. # Overrides ApplicationController#verify_authenticity_token to disable
  25. # token verification on openid callbacks
  26. def verify_authenticity_token
  27. unless using_open_id?
  28. super
  29. end
  30. end
  31. # Login request and validation
  32. def login
  33. if request.post?
  34. authenticate_user
  35. else
  36. if User.current.logged?
  37. redirect_back_or_default home_url, :referer => true
  38. end
  39. end
  40. rescue AuthSourceException => e
  41. logger.error "An error occurred when authenticating #{params[:username]}: #{e.message}"
  42. render_error :message => e.message
  43. end
  44. # Log out current user and redirect to welcome page
  45. def logout
  46. if User.current.anonymous?
  47. redirect_to home_url
  48. elsif request.post?
  49. logout_user
  50. redirect_to home_url
  51. end
  52. # display the logout form
  53. end
  54. # Lets user choose a new password
  55. def lost_password
  56. (redirect_to(home_url); return) unless Setting.lost_password?
  57. if prt = (params[:token] || session[:password_recovery_token])
  58. @token = Token.find_token("recovery", prt.to_s)
  59. if @token.nil?
  60. redirect_to home_url
  61. return
  62. elsif @token.expired?
  63. # remove expired token from session and let user try again
  64. session[:password_recovery_token] = nil
  65. flash[:error] = l(:error_token_expired)
  66. redirect_to lost_password_url
  67. return
  68. end
  69. # redirect to remove the token query parameter from the URL and add it to the session
  70. if request.query_parameters[:token].present?
  71. session[:password_recovery_token] = @token.value
  72. redirect_to lost_password_url
  73. return
  74. end
  75. @user = @token.user
  76. unless @user && @user.active?
  77. redirect_to home_url
  78. return
  79. end
  80. if request.post?
  81. if @user.must_change_passwd? && @user.check_password?(params[:new_password])
  82. flash.now[:error] = l(:notice_new_password_must_be_different)
  83. else
  84. @user.password, @user.password_confirmation = params[:new_password], params[:new_password_confirmation]
  85. @user.must_change_passwd = false
  86. if @user.save
  87. @token.destroy
  88. Mailer.deliver_password_updated(@user, User.current)
  89. flash[:notice] = l(:notice_account_password_updated)
  90. redirect_to signin_path
  91. return
  92. end
  93. end
  94. end
  95. render :template => "account/password_recovery"
  96. return
  97. else
  98. if request.post?
  99. email = params[:mail].to_s.strip
  100. user = User.find_by_mail(email)
  101. # user not found
  102. unless user
  103. flash.now[:error] = l(:notice_account_unknown_email)
  104. return
  105. end
  106. unless user.active?
  107. handle_inactive_user(user, lost_password_path)
  108. return
  109. end
  110. # user cannot change its password
  111. unless user.change_password_allowed?
  112. flash.now[:error] = l(:notice_can_t_change_password)
  113. return
  114. end
  115. # create a new token for password recovery
  116. token = Token.new(:user => user, :action => "recovery")
  117. if token.save
  118. # Don't use the param to send the email
  119. recipent = user.mails.detect {|e| email.casecmp(e) == 0} || user.mail
  120. Mailer.deliver_lost_password(user, token, recipent)
  121. flash[:notice] = l(:notice_account_lost_email_sent)
  122. redirect_to signin_path
  123. return
  124. end
  125. end
  126. end
  127. end
  128. # User self-registration
  129. def register
  130. (redirect_to(home_url); return) unless Setting.self_registration? || session[:auth_source_registration]
  131. if !request.post?
  132. session[:auth_source_registration] = nil
  133. @user = User.new(:language => current_language.to_s)
  134. else
  135. user_params = params[:user] || {}
  136. @user = User.new
  137. @user.safe_attributes = user_params
  138. @user.pref.safe_attributes = params[:pref]
  139. @user.admin = false
  140. @user.register
  141. if session[:auth_source_registration]
  142. @user.activate
  143. @user.login = session[:auth_source_registration][:login]
  144. @user.auth_source_id = session[:auth_source_registration][:auth_source_id]
  145. if @user.save
  146. session[:auth_source_registration] = nil
  147. self.logged_user = @user
  148. flash[:notice] = l(:notice_account_activated)
  149. redirect_to my_account_path
  150. end
  151. else
  152. unless user_params[:identity_url].present? && user_params[:password].blank? && user_params[:password_confirmation].blank?
  153. @user.password, @user.password_confirmation = user_params[:password], user_params[:password_confirmation]
  154. end
  155. case Setting.self_registration
  156. when '1'
  157. register_by_email_activation(@user)
  158. when '3'
  159. register_automatically(@user)
  160. else
  161. register_manually_by_administrator(@user)
  162. end
  163. end
  164. end
  165. end
  166. # Token based account activation
  167. def activate
  168. (redirect_to(home_url); return) unless Setting.self_registration? && params[:token].present?
  169. token = Token.find_token('register', params[:token].to_s)
  170. (redirect_to(home_url); return) unless token and !token.expired?
  171. user = token.user
  172. (redirect_to(home_url); return) unless user.registered?
  173. user.activate
  174. if user.save
  175. token.destroy
  176. flash[:notice] = l(:notice_account_activated)
  177. end
  178. redirect_to signin_path
  179. end
  180. # Sends a new account activation email
  181. def activation_email
  182. if session[:registered_user_id] && Setting.self_registration == '1'
  183. user_id = session.delete(:registered_user_id).to_i
  184. user = User.find_by_id(user_id)
  185. if user && user.registered?
  186. register_by_email_activation(user)
  187. return
  188. end
  189. end
  190. redirect_to(home_url)
  191. end
  192. before_action :require_active_twofa, :twofa_setup, only: [:twofa_resend, :twofa_confirm, :twofa]
  193. before_action :prevent_twofa_session_replay, only: [:twofa_resend, :twofa]
  194. def twofa_resend
  195. # otp resends count toward the maximum of 3 otp entry tries per password entry
  196. if session[:twofa_tries_counter] > 3
  197. destroy_twofa_session
  198. flash[:error] = l('twofa_too_many_tries')
  199. redirect_to home_url
  200. else
  201. if @twofa.send_code(controller: 'account', action: 'twofa')
  202. flash[:notice] = l('twofa_code_sent')
  203. end
  204. redirect_to account_twofa_confirm_path
  205. end
  206. end
  207. def twofa_confirm
  208. @twofa_view = @twofa.otp_confirm_view_variables
  209. end
  210. def twofa
  211. if @twofa.verify!(params[:twofa_code].to_s)
  212. destroy_twofa_session
  213. handle_active_user(@user)
  214. # allow at most 3 otp entry tries per successfull password entry
  215. # this allows using anti brute force techniques on the password entry to also
  216. # prevent brute force attacks on the one-time password
  217. elsif session[:twofa_tries_counter] > 3
  218. destroy_twofa_session
  219. flash[:error] = l('twofa_too_many_tries')
  220. redirect_to home_url
  221. else
  222. flash[:error] = l('twofa_invalid_code')
  223. redirect_to account_twofa_confirm_path
  224. end
  225. end
  226. private
  227. def prevent_twofa_session_replay
  228. renew_twofa_session(@user)
  229. end
  230. def twofa_setup
  231. # twofa sessions are only valid 2 minutes at a time
  232. twomind = 0.0014 # a little more than 2 minutes in days
  233. @user = Token.find_active_user('twofa_session', session[:twofa_session_token].to_s, twomind)
  234. if @user.blank?
  235. destroy_twofa_session
  236. redirect_to home_url
  237. return
  238. end
  239. # copy back_url, autologin back to params where they are expected
  240. params[:back_url] ||= session[:twofa_back_url]
  241. params[:autologin] ||= session[:twofa_autologin]
  242. # set locale for the twofa user
  243. set_localization(@user)
  244. # set the requesting IP of the twofa user (e.g. for security notifications)
  245. @user.remote_ip = request.remote_ip
  246. @twofa = Redmine::Twofa.for_user(@user)
  247. end
  248. def require_active_twofa
  249. Setting.twofa? ? true : deny_access
  250. end
  251. def setup_twofa_session(user, previous_tries=1)
  252. token = Token.create(user: user, action: 'twofa_session')
  253. session[:twofa_session_token] = token.value
  254. session[:twofa_tries_counter] = previous_tries
  255. session[:twofa_back_url] = params[:back_url]
  256. session[:twofa_autologin] = params[:autologin]
  257. end
  258. # Prevent replay attacks by using each twofa_session_token only for exactly one request
  259. def renew_twofa_session(user)
  260. twofa_tries = session[:twofa_tries_counter].to_i + 1
  261. destroy_twofa_session
  262. setup_twofa_session(user, twofa_tries)
  263. end
  264. def destroy_twofa_session
  265. # make sure tokens can only be used once server-side to prevent replay attacks
  266. Token.find_token('twofa_session', session[:twofa_session_token].to_s).try(:delete)
  267. session[:twofa_session_token] = nil
  268. session[:twofa_tries_counter] = nil
  269. session[:twofa_back_url] = nil
  270. session[:twofa_autologin] = nil
  271. end
  272. def authenticate_user
  273. if Setting.openid? && using_open_id?
  274. open_id_authenticate(params[:openid_url])
  275. else
  276. password_authentication
  277. end
  278. end
  279. def password_authentication
  280. user = User.try_to_login!(params[:username], params[:password], false)
  281. if user.nil?
  282. invalid_credentials
  283. elsif user.new_record?
  284. onthefly_creation_failed(user, {:login => user.login, :auth_source_id => user.auth_source_id})
  285. else
  286. # Valid user
  287. if user.active?
  288. if user.twofa_active?
  289. setup_twofa_session user
  290. twofa = Redmine::Twofa.for_user(user)
  291. if twofa.send_code(controller: 'account', action: 'twofa')
  292. flash[:notice] = l('twofa_code_sent')
  293. end
  294. redirect_to account_twofa_confirm_path
  295. else
  296. handle_active_user(user)
  297. end
  298. else
  299. handle_inactive_user(user)
  300. end
  301. end
  302. end
  303. def handle_active_user(user)
  304. successful_authentication(user)
  305. update_sudo_timestamp! # activate Sudo Mode
  306. end
  307. def open_id_authenticate(openid_url)
  308. back_url = signin_url(:autologin => params[:autologin])
  309. authenticate_with_open_id(
  310. openid_url, :required => [:nickname, :fullname, :email],
  311. :return_to => back_url, :method => :post
  312. ) do |result, identity_url, registration|
  313. if result.successful?
  314. user = User.find_or_initialize_by_identity_url(identity_url)
  315. if user.new_record?
  316. # Self-registration off
  317. (redirect_to(home_url); return) unless Setting.self_registration?
  318. # Create on the fly
  319. user.login = registration['nickname'] unless registration['nickname'].nil?
  320. user.mail = registration['email'] unless registration['email'].nil?
  321. user.firstname, user.lastname = registration['fullname'].split(' ') unless registration['fullname'].nil?
  322. user.random_password
  323. user.register
  324. case Setting.self_registration
  325. when '1'
  326. register_by_email_activation(user) do
  327. onthefly_creation_failed(user)
  328. end
  329. when '3'
  330. register_automatically(user) do
  331. onthefly_creation_failed(user)
  332. end
  333. else
  334. register_manually_by_administrator(user) do
  335. onthefly_creation_failed(user)
  336. end
  337. end
  338. else
  339. # Existing record
  340. if user.active?
  341. successful_authentication(user)
  342. else
  343. handle_inactive_user(user)
  344. end
  345. end
  346. end
  347. end
  348. end
  349. def successful_authentication(user)
  350. logger.info "Successful authentication for '#{user.login}' from #{request.remote_ip} at #{Time.now.utc}"
  351. # Valid user
  352. self.logged_user = user
  353. # generate a key and set cookie if autologin
  354. if params[:autologin] && Setting.autologin?
  355. set_autologin_cookie(user)
  356. end
  357. call_hook(:controller_account_success_authentication_after, {:user => user})
  358. redirect_back_or_default my_page_path
  359. end
  360. def set_autologin_cookie(user)
  361. token = user.generate_autologin_token
  362. secure = Redmine::Configuration['autologin_cookie_secure']
  363. if secure.nil?
  364. secure = request.ssl?
  365. end
  366. cookie_options = {
  367. :value => token,
  368. :expires => 1.year.from_now,
  369. :path => (Redmine::Configuration['autologin_cookie_path'] || RedmineApp::Application.config.relative_url_root || '/'),
  370. :secure => secure,
  371. :httponly => true
  372. }
  373. cookies[autologin_cookie_name] = cookie_options
  374. end
  375. # Onthefly creation failed, display the registration form to fill/fix attributes
  376. def onthefly_creation_failed(user, auth_source_options = {})
  377. @user = user
  378. session[:auth_source_registration] = auth_source_options unless auth_source_options.empty?
  379. render :action => 'register'
  380. end
  381. def invalid_credentials
  382. logger.warn "Failed login for '#{params[:username]}' from #{request.remote_ip} at #{Time.now.utc}"
  383. flash.now[:error] = l(:notice_account_invalid_credentials)
  384. end
  385. # Register a user for email activation.
  386. #
  387. # Pass a block for behavior when a user fails to save
  388. def register_by_email_activation(user, &block)
  389. token = Token.new(:user => user, :action => "register")
  390. if user.save and token.save
  391. Mailer.deliver_register(user, token)
  392. flash[:notice] = l(:notice_account_register_done, :email => ERB::Util.h(user.mail))
  393. redirect_to signin_path
  394. else
  395. yield if block_given?
  396. end
  397. end
  398. # Automatically register a user
  399. #
  400. # Pass a block for behavior when a user fails to save
  401. def register_automatically(user, &block)
  402. # Automatic activation
  403. user.activate
  404. user.last_login_on = Time.now
  405. if user.save
  406. self.logged_user = user
  407. flash[:notice] = l(:notice_account_activated)
  408. redirect_to my_account_path
  409. else
  410. yield if block_given?
  411. end
  412. end
  413. # Manual activation by the administrator
  414. #
  415. # Pass a block for behavior when a user fails to save
  416. def register_manually_by_administrator(user, &block)
  417. if user.save
  418. # Sends an email to the administrators
  419. Mailer.deliver_account_activation_request(user)
  420. account_pending(user)
  421. else
  422. yield if block_given?
  423. end
  424. end
  425. def handle_inactive_user(user, redirect_path=signin_path)
  426. if user.registered?
  427. account_pending(user, redirect_path)
  428. else
  429. account_locked(user, redirect_path)
  430. end
  431. end
  432. def account_pending(user, redirect_path=signin_path)
  433. if Setting.self_registration == '1'
  434. flash[:error] = l(:notice_account_not_activated_yet, :url => activation_email_path)
  435. session[:registered_user_id] = user.id
  436. else
  437. flash[:error] = l(:notice_account_pending)
  438. end
  439. redirect_to redirect_path
  440. end
  441. def account_locked(user, redirect_path=signin_path)
  442. flash[:error] = l(:notice_account_locked)
  443. redirect_to redirect_path
  444. end
  445. end