mirror of
https://github.com/mastodon/mastodon.git
synced 2026-03-21 18:05:23 -05:00
Some checks failed
Check i18n / check-i18n (push) Waiting to run
Chromatic / Check for relevant changes (push) Waiting to run
Chromatic / Run Chromatic (push) Blocked by required conditions
CodeQL / Analyze (actions) (push) Waiting to run
CodeQL / Analyze (javascript) (push) Waiting to run
CodeQL / Analyze (ruby) (push) Waiting to run
Check formatting / lint (push) Waiting to run
JavaScript Linting / lint (push) Waiting to run
Ruby Linting / lint (push) Waiting to run
JavaScript Testing / test (push) Waiting to run
Historical data migration test / test (14-alpine) (push) Waiting to run
Historical data migration test / test (15-alpine) (push) Waiting to run
Historical data migration test / test (16-alpine) (push) Waiting to run
Historical data migration test / test (17-alpine) (push) Waiting to run
Ruby Testing / build (production) (push) Waiting to run
Ruby Testing / build (test) (push) Waiting to run
Ruby Testing / test (.ruby-version) (push) Blocked by required conditions
Ruby Testing / test (3.2) (push) Blocked by required conditions
Ruby Testing / test (3.3) (push) Blocked by required conditions
Ruby Testing / End to End testing (.ruby-version) (push) Blocked by required conditions
Ruby Testing / End to End testing (3.2) (push) Blocked by required conditions
Ruby Testing / End to End testing (3.3) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (.ruby-version, docker.elastic.co/elasticsearch/elasticsearch:7.17.29) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (.ruby-version, docker.elastic.co/elasticsearch/elasticsearch:8.19.2) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (.ruby-version, opensearchproject/opensearch:2) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (3.2, docker.elastic.co/elasticsearch/elasticsearch:7.17.29) (push) Blocked by required conditions
Ruby Testing / Elastic Search integration testing (3.3, docker.elastic.co/elasticsearch/elasticsearch:7.17.29) (push) Blocked by required conditions
Bundler Audit / security (push) Has been cancelled
Crowdin / Upload translations / upload-translations (push) Has been cancelled
CSS Linting / lint (push) Has been cancelled
Haml Linting / lint (push) Has been cancelled
144 lines
4.0 KiB
Ruby
144 lines
4.0 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
class ApplicationController < ActionController::Base
|
|
# Prevent CSRF attacks by raising an exception.
|
|
# For APIs, you may want to use :null_session instead.
|
|
protect_from_forgery with: :exception
|
|
|
|
include Localized
|
|
include UserTrackingConcern
|
|
include SessionTrackingConcern
|
|
include CacheConcern
|
|
include ErrorResponses
|
|
include PreloadingConcern
|
|
include DomainControlHelper
|
|
include DatabaseHelper
|
|
include AuthorizedFetchHelper
|
|
include SelfDestructHelper
|
|
|
|
helper_method :current_account
|
|
helper_method :current_session
|
|
helper_method :single_user_mode?
|
|
helper_method :use_seamless_external_login?
|
|
helper_method :sso_account_settings
|
|
helper_method :limited_federation_mode?
|
|
helper_method :skip_csrf_meta_tags?
|
|
|
|
before_action :check_self_destruct!
|
|
|
|
before_action :store_referrer, except: :raise_not_found, if: :devise_controller?
|
|
before_action :require_functional!, if: :user_signed_in?
|
|
|
|
before_action :set_cache_control_defaults
|
|
|
|
skip_before_action :verify_authenticity_token, only: :raise_not_found
|
|
|
|
def raise_not_found
|
|
raise ActionController::RoutingError, "No route matches #{params[:unmatched_route]}"
|
|
end
|
|
|
|
private
|
|
|
|
def public_fetch_mode?
|
|
!authorized_fetch_mode?
|
|
end
|
|
|
|
def store_referrer
|
|
return if request.referer.blank?
|
|
|
|
redirect_uri = URI(request.referer)
|
|
return if redirect_uri.path.start_with?('/auth', '/settings/two_factor_authentication', '/settings/otp_authentication')
|
|
|
|
stored_url = redirect_uri.to_s if redirect_uri.host == request.host && redirect_uri.port == request.port
|
|
|
|
store_location_for(:user, stored_url)
|
|
end
|
|
|
|
def mfa_setup_path(path_params = {})
|
|
settings_two_factor_authentication_methods_path(path_params)
|
|
end
|
|
|
|
def require_functional!
|
|
return if current_user.functional?
|
|
|
|
respond_to do |format|
|
|
format.any do
|
|
if current_user.missing_2fa?
|
|
redirect_to mfa_setup_path
|
|
elsif current_user.confirmed?
|
|
redirect_to edit_user_registration_path
|
|
else
|
|
redirect_to auth_setup_path
|
|
end
|
|
end
|
|
|
|
format.json do
|
|
if !current_user.confirmed?
|
|
render json: { error: 'Your login is missing a confirmed e-mail address' }, status: 403
|
|
elsif !current_user.approved?
|
|
render json: { error: 'Your login is currently pending approval' }, status: 403
|
|
elsif current_user.missing_2fa?
|
|
render json: { error: 'Your account requires two-factor authentication' }, status: 403
|
|
elsif !current_user.functional?
|
|
render json: { error: 'Your login is currently disabled' }, status: 403
|
|
end
|
|
end
|
|
end
|
|
end
|
|
|
|
def skip_csrf_meta_tags?
|
|
false
|
|
end
|
|
|
|
def after_sign_out_path_for(_resource_or_scope)
|
|
if ENV['OMNIAUTH_ONLY'] == 'true' && Rails.configuration.x.omniauth.oidc_enabled?
|
|
'/auth/auth/openid_connect/logout'
|
|
else
|
|
new_user_session_path
|
|
end
|
|
end
|
|
|
|
protected
|
|
|
|
def truthy_param?(key)
|
|
ActiveModel::Type::Boolean.new.cast(params[key])
|
|
end
|
|
|
|
def single_user_mode?
|
|
@single_user_mode ||= Rails.configuration.x.single_user_mode && Account.without_internal.exists?
|
|
end
|
|
|
|
def use_seamless_external_login?
|
|
Devise.pam_authentication || Devise.ldap_authentication
|
|
end
|
|
|
|
def sso_account_settings
|
|
ENV.fetch('SSO_ACCOUNT_SETTINGS', nil)
|
|
end
|
|
|
|
def current_account
|
|
return @current_account if defined?(@current_account)
|
|
|
|
@current_account = current_user&.account
|
|
end
|
|
|
|
def current_session
|
|
return @current_session if defined?(@current_session)
|
|
|
|
@current_session = SessionActivation.find_by(session_id: cookies.signed['_session_id']) if cookies.signed['_session_id'].present?
|
|
end
|
|
|
|
def check_self_destruct!
|
|
return unless self_destruct?
|
|
|
|
respond_to do |format|
|
|
format.any { render 'errors/self_destruct', layout: 'auth', status: 410, formats: [:html] }
|
|
format.json { render json: { error: Rack::Utils::HTTP_STATUS_CODES[410] }, status: 410 }
|
|
end
|
|
end
|
|
|
|
def set_cache_control_defaults
|
|
response.cache_control.replace(private: true, no_store: true)
|
|
end
|
|
end
|