You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

account_controller.rb 16KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490
  1. # frozen_string_literal: true
  2. # Redmine - project management software
  3. # Copyright (C) 2006-2021 Jean-Philippe Lang
  4. #
  5. # This program is free software; you can redistribute it and/or
  6. # modify it under the terms of the GNU General Public License
  7. # as published by the Free Software Foundation; either version 2
  8. # of the License, or (at your option) any later version.
  9. #
  10. # This program is distributed in the hope that it will be useful,
  11. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. # GNU General Public License for more details.
  14. #
  15. # You should have received a copy of the GNU General Public License
  16. # along with this program; if not, write to the Free Software
  17. # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
  18. class AccountController < ApplicationController
  19. helper :custom_fields
  20. include CustomFieldsHelper
  21. self.main_menu = false
  22. # prevents login action to be filtered by check_if_login_required application scope filter
  23. skip_before_action :check_if_login_required, :check_password_change
  24. skip_before_action :check_twofa_activation, :only => :logout
  25. # Overrides ApplicationController#verify_authenticity_token to disable
  26. # token verification on openid callbacks
  27. def verify_authenticity_token
  28. unless using_open_id?
  29. super
  30. end
  31. end
  32. # Login request and validation
  33. def login
  34. if request.post?
  35. authenticate_user
  36. else
  37. if User.current.logged?
  38. redirect_back_or_default home_url, :referer => true
  39. end
  40. end
  41. rescue AuthSourceException => e
  42. logger.error "An error occurred when authenticating #{params[:username]}: #{e.message}"
  43. render_error :message => e.message
  44. end
  45. # Log out current user and redirect to welcome page
  46. def logout
  47. if User.current.anonymous?
  48. redirect_to home_url
  49. elsif request.post?
  50. logout_user
  51. redirect_to home_url
  52. end
  53. # display the logout form
  54. end
  55. # Lets user choose a new password
  56. def lost_password
  57. (redirect_to(home_url); return) unless Setting.lost_password?
  58. if prt = (params[:token] || session[:password_recovery_token])
  59. @token = Token.find_token("recovery", prt.to_s)
  60. if @token.nil?
  61. redirect_to home_url
  62. return
  63. elsif @token.expired?
  64. # remove expired token from session and let user try again
  65. session[:password_recovery_token] = nil
  66. flash[:error] = l(:error_token_expired)
  67. redirect_to lost_password_url
  68. return
  69. end
  70. # redirect to remove the token query parameter from the URL and add it to the session
  71. if request.query_parameters[:token].present?
  72. session[:password_recovery_token] = @token.value
  73. redirect_to lost_password_url
  74. return
  75. end
  76. @user = @token.user
  77. unless @user && @user.active?
  78. redirect_to home_url
  79. return
  80. end
  81. if request.post?
  82. if @user.must_change_passwd? && @user.check_password?(params[:new_password])
  83. flash.now[:error] = l(:notice_new_password_must_be_different)
  84. else
  85. @user.password, @user.password_confirmation = params[:new_password], params[:new_password_confirmation]
  86. @user.must_change_passwd = false
  87. if @user.save
  88. @token.destroy
  89. Mailer.deliver_password_updated(@user, User.current)
  90. flash[:notice] = l(:notice_account_password_updated)
  91. redirect_to signin_path
  92. return
  93. end
  94. end
  95. end
  96. render :template => "account/password_recovery"
  97. return
  98. else
  99. if request.post?
  100. email = params[:mail].to_s.strip
  101. user = User.find_by_mail(email)
  102. # user not found
  103. unless user
  104. flash.now[:error] = l(:notice_account_unknown_email)
  105. return
  106. end
  107. unless user.active?
  108. handle_inactive_user(user, lost_password_path)
  109. return
  110. end
  111. # user cannot change its password
  112. unless user.change_password_allowed?
  113. flash.now[:error] = l(:notice_can_t_change_password)
  114. return
  115. end
  116. # create a new token for password recovery
  117. token = Token.new(:user => user, :action => "recovery")
  118. if token.save
  119. # Don't use the param to send the email
  120. recipent = user.mails.detect {|e| email.casecmp(e) == 0} || user.mail
  121. Mailer.deliver_lost_password(user, token, recipent)
  122. flash[:notice] = l(:notice_account_lost_email_sent)
  123. redirect_to signin_path
  124. return
  125. end
  126. end
  127. end
  128. end
  129. # User self-registration
  130. def register
  131. (redirect_to(home_url); return) unless Setting.self_registration? || session[:auth_source_registration]
  132. if !request.post?
  133. session[:auth_source_registration] = nil
  134. @user = User.new(:language => current_language.to_s)
  135. else
  136. user_params = params[:user] || {}
  137. @user = User.new
  138. @user.safe_attributes = user_params
  139. @user.pref.safe_attributes = params[:pref]
  140. @user.admin = false
  141. @user.register
  142. if session[:auth_source_registration]
  143. @user.activate
  144. @user.login = session[:auth_source_registration][:login]
  145. @user.auth_source_id = session[:auth_source_registration][:auth_source_id]
  146. if @user.save
  147. session[:auth_source_registration] = nil
  148. self.logged_user = @user
  149. flash[:notice] = l(:notice_account_activated)
  150. redirect_to my_account_path
  151. end
  152. else
  153. unless user_params[:identity_url].present? && user_params[:password].blank? && user_params[:password_confirmation].blank?
  154. @user.password, @user.password_confirmation = user_params[:password], user_params[:password_confirmation]
  155. end
  156. case Setting.self_registration
  157. when '1'
  158. register_by_email_activation(@user)
  159. when '3'
  160. register_automatically(@user)
  161. else
  162. register_manually_by_administrator(@user)
  163. end
  164. end
  165. end
  166. end
  167. # Token based account activation
  168. def activate
  169. (redirect_to(home_url); return) unless Setting.self_registration? && params[:token].present?
  170. token = Token.find_token('register', params[:token].to_s)
  171. (redirect_to(home_url); return) unless token and !token.expired?
  172. user = token.user
  173. (redirect_to(home_url); return) unless user.registered?
  174. user.activate
  175. if user.save
  176. token.destroy
  177. flash[:notice] = l(:notice_account_activated)
  178. end
  179. redirect_to signin_path
  180. end
  181. # Sends a new account activation email
  182. def activation_email
  183. if session[:registered_user_id] && Setting.self_registration == '1'
  184. user_id = session.delete(:registered_user_id).to_i
  185. user = User.find_by_id(user_id)
  186. if user && user.registered?
  187. register_by_email_activation(user)
  188. return
  189. end
  190. end
  191. redirect_to(home_url)
  192. end
  193. before_action :require_active_twofa, :twofa_setup, only: [:twofa_resend, :twofa_confirm, :twofa]
  194. before_action :prevent_twofa_session_replay, only: [:twofa_resend, :twofa]
  195. def twofa_resend
  196. # otp resends count toward the maximum of 3 otp entry tries per password entry
  197. if session[:twofa_tries_counter] > 3
  198. destroy_twofa_session
  199. flash[:error] = l('twofa_too_many_tries')
  200. redirect_to home_url
  201. else
  202. if @twofa.send_code(controller: 'account', action: 'twofa')
  203. flash[:notice] = l('twofa_code_sent')
  204. end
  205. redirect_to account_twofa_confirm_path
  206. end
  207. end
  208. def twofa_confirm
  209. @twofa_view = @twofa.otp_confirm_view_variables
  210. end
  211. def twofa
  212. if @twofa.verify!(params[:twofa_code].to_s)
  213. destroy_twofa_session
  214. handle_active_user(@user)
  215. # allow at most 3 otp entry tries per successfull password entry
  216. # this allows using anti brute force techniques on the password entry to also
  217. # prevent brute force attacks on the one-time password
  218. elsif session[:twofa_tries_counter] > 3
  219. destroy_twofa_session
  220. flash[:error] = l('twofa_too_many_tries')
  221. redirect_to home_url
  222. else
  223. flash[:error] = l('twofa_invalid_code')
  224. redirect_to account_twofa_confirm_path
  225. end
  226. end
  227. private
  228. def prevent_twofa_session_replay
  229. renew_twofa_session(@user)
  230. end
  231. def twofa_setup
  232. # twofa sessions are only valid 2 minutes at a time
  233. twomind = 0.0014 # a little more than 2 minutes in days
  234. @user = Token.find_active_user('twofa_session', session[:twofa_session_token].to_s, twomind)
  235. if @user.blank?
  236. destroy_twofa_session
  237. redirect_to home_url
  238. return
  239. end
  240. # copy back_url, autologin back to params where they are expected
  241. params[:back_url] ||= session[:twofa_back_url]
  242. params[:autologin] ||= session[:twofa_autologin]
  243. # set locale for the twofa user
  244. set_localization(@user)
  245. # set the requesting IP of the twofa user (e.g. for security notifications)
  246. @user.remote_ip = request.remote_ip
  247. @twofa = Redmine::Twofa.for_user(@user)
  248. end
  249. def require_active_twofa
  250. Setting.twofa? ? true : deny_access
  251. end
  252. def setup_twofa_session(user, previous_tries=1)
  253. token = Token.create(user: user, action: 'twofa_session')
  254. session[:twofa_session_token] = token.value
  255. session[:twofa_tries_counter] = previous_tries
  256. session[:twofa_back_url] = params[:back_url]
  257. session[:twofa_autologin] = params[:autologin]
  258. end
  259. # Prevent replay attacks by using each twofa_session_token only for exactly one request
  260. def renew_twofa_session(user)
  261. twofa_tries = session[:twofa_tries_counter].to_i + 1
  262. destroy_twofa_session
  263. setup_twofa_session(user, twofa_tries)
  264. end
  265. def destroy_twofa_session
  266. # make sure tokens can only be used once server-side to prevent replay attacks
  267. Token.find_token('twofa_session', session[:twofa_session_token].to_s).try(:delete)
  268. session[:twofa_session_token] = nil
  269. session[:twofa_tries_counter] = nil
  270. session[:twofa_back_url] = nil
  271. session[:twofa_autologin] = nil
  272. end
  273. def authenticate_user
  274. if Setting.openid? && using_open_id?
  275. open_id_authenticate(params[:openid_url])
  276. else
  277. password_authentication
  278. end
  279. end
  280. def password_authentication
  281. user = User.try_to_login!(params[:username], params[:password], false)
  282. if user.nil?
  283. invalid_credentials
  284. elsif user.new_record?
  285. onthefly_creation_failed(user, {:login => user.login, :auth_source_id => user.auth_source_id})
  286. else
  287. # Valid user
  288. if user.active?
  289. if user.twofa_active?
  290. setup_twofa_session user
  291. twofa = Redmine::Twofa.for_user(user)
  292. if twofa.send_code(controller: 'account', action: 'twofa')
  293. flash[:notice] = l('twofa_code_sent')
  294. end
  295. redirect_to account_twofa_confirm_path
  296. else
  297. handle_active_user(user)
  298. end
  299. else
  300. handle_inactive_user(user)
  301. end
  302. end
  303. end
  304. def handle_active_user(user)
  305. successful_authentication(user)
  306. update_sudo_timestamp! # activate Sudo Mode
  307. end
  308. def open_id_authenticate(openid_url)
  309. back_url = signin_url(:autologin => params[:autologin])
  310. authenticate_with_open_id(
  311. openid_url, :required => [:nickname, :fullname, :email],
  312. :return_to => back_url, :method => :post
  313. ) do |result, identity_url, registration|
  314. if result.successful?
  315. user = User.find_or_initialize_by_identity_url(identity_url)
  316. if user.new_record?
  317. # Self-registration off
  318. (redirect_to(home_url); return) unless Setting.self_registration?
  319. # Create on the fly
  320. user.login = registration['nickname'] unless registration['nickname'].nil?
  321. user.mail = registration['email'] unless registration['email'].nil?
  322. user.firstname, user.lastname = registration['fullname'].split(' ') unless registration['fullname'].nil?
  323. user.random_password
  324. user.register
  325. case Setting.self_registration
  326. when '1'
  327. register_by_email_activation(user) do
  328. onthefly_creation_failed(user)
  329. end
  330. when '3'
  331. register_automatically(user) do
  332. onthefly_creation_failed(user)
  333. end
  334. else
  335. register_manually_by_administrator(user) do
  336. onthefly_creation_failed(user)
  337. end
  338. end
  339. else
  340. # Existing record
  341. if user.active?
  342. successful_authentication(user)
  343. else
  344. handle_inactive_user(user)
  345. end
  346. end
  347. end
  348. end
  349. end
  350. def successful_authentication(user)
  351. logger.info "Successful authentication for '#{user.login}' from #{request.remote_ip} at #{Time.now.utc}"
  352. # Valid user
  353. self.logged_user = user
  354. # generate a key and set cookie if autologin
  355. if params[:autologin] && Setting.autologin?
  356. set_autologin_cookie(user)
  357. end
  358. call_hook(:controller_account_success_authentication_after, {:user => user})
  359. redirect_back_or_default my_page_path
  360. end
  361. def set_autologin_cookie(user)
  362. token = user.generate_autologin_token
  363. secure = Redmine::Configuration['autologin_cookie_secure']
  364. if secure.nil?
  365. secure = request.ssl?
  366. end
  367. cookie_options = {
  368. :value => token,
  369. :expires => 1.year.from_now,
  370. :path => (Redmine::Configuration['autologin_cookie_path'] || RedmineApp::Application.config.relative_url_root || '/'),
  371. :secure => secure,
  372. :httponly => true
  373. }
  374. cookies[autologin_cookie_name] = cookie_options
  375. end
  376. # Onthefly creation failed, display the registration form to fill/fix attributes
  377. def onthefly_creation_failed(user, auth_source_options = {})
  378. @user = user
  379. session[:auth_source_registration] = auth_source_options unless auth_source_options.empty?
  380. render :action => 'register'
  381. end
  382. def invalid_credentials
  383. logger.warn "Failed login for '#{params[:username]}' from #{request.remote_ip} at #{Time.now.utc}"
  384. flash.now[:error] = l(:notice_account_invalid_credentials)
  385. end
  386. # Register a user for email activation.
  387. #
  388. # Pass a block for behavior when a user fails to save
  389. def register_by_email_activation(user, &block)
  390. token = Token.new(:user => user, :action => "register")
  391. if user.save and token.save
  392. Mailer.deliver_register(user, token)
  393. flash[:notice] = l(:notice_account_register_done, :email => ERB::Util.h(user.mail))
  394. redirect_to signin_path
  395. else
  396. yield if block_given?
  397. end
  398. end
  399. # Automatically register a user
  400. #
  401. # Pass a block for behavior when a user fails to save
  402. def register_automatically(user, &block)
  403. # Automatic activation
  404. user.activate
  405. user.last_login_on = Time.now
  406. if user.save
  407. self.logged_user = user
  408. flash[:notice] = l(:notice_account_activated)
  409. redirect_to my_account_path
  410. else
  411. yield if block_given?
  412. end
  413. end
  414. # Manual activation by the administrator
  415. #
  416. # Pass a block for behavior when a user fails to save
  417. def register_manually_by_administrator(user, &block)
  418. if user.save
  419. # Sends an email to the administrators
  420. Mailer.deliver_account_activation_request(user)
  421. account_pending(user)
  422. else
  423. yield if block_given?
  424. end
  425. end
  426. def handle_inactive_user(user, redirect_path=signin_path)
  427. if user.registered?
  428. account_pending(user, redirect_path)
  429. else
  430. account_locked(user, redirect_path)
  431. end
  432. end
  433. def account_pending(user, redirect_path=signin_path)
  434. if Setting.self_registration == '1'
  435. flash[:error] = l(:notice_account_not_activated_yet, :url => activation_email_path)
  436. session[:registered_user_id] = user.id
  437. else
  438. flash[:error] = l(:notice_account_pending)
  439. end
  440. redirect_to redirect_path
  441. end
  442. def account_locked(user, redirect_path=signin_path)
  443. flash[:error] = l(:notice_account_locked)
  444. redirect_to redirect_path
  445. end
  446. end