mirror of
https://github.com/mastodon/mastodon
synced 2024-12-15 07:08:29 +09:00
190 lines
4.9 KiB
Ruby
190 lines
4.9 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
class ApplicationController < ActionController::Base
|
|
# Prevent CSRF attacks by raising an exception.
|
|
# For APIs, you may want to use :null_session instead.
|
|
protect_from_forgery with: :exception
|
|
|
|
include Localized
|
|
include UserTrackingConcern
|
|
include SessionTrackingConcern
|
|
include CacheConcern
|
|
include PreloadingConcern
|
|
include DomainControlHelper
|
|
include DatabaseHelper
|
|
include AuthorizedFetchHelper
|
|
include SelfDestructHelper
|
|
|
|
helper_method :current_account
|
|
helper_method :current_session
|
|
helper_method :current_theme
|
|
helper_method :single_user_mode?
|
|
helper_method :use_seamless_external_login?
|
|
helper_method :omniauth_only?
|
|
helper_method :sso_account_settings
|
|
helper_method :limited_federation_mode?
|
|
helper_method :body_class_string
|
|
helper_method :skip_csrf_meta_tags?
|
|
|
|
rescue_from ActionController::ParameterMissing, Paperclip::AdapterRegistry::NoHandlerError, with: :bad_request
|
|
rescue_from Mastodon::NotPermittedError, with: :forbidden
|
|
rescue_from ActionController::RoutingError, ActiveRecord::RecordNotFound, with: :not_found
|
|
rescue_from ActionController::UnknownFormat, with: :not_acceptable
|
|
rescue_from ActionController::InvalidAuthenticityToken, with: :unprocessable_entity
|
|
rescue_from Mastodon::RateLimitExceededError, with: :too_many_requests
|
|
|
|
rescue_from HTTP::Error, OpenSSL::SSL::SSLError, with: :internal_server_error
|
|
rescue_from Mastodon::RaceConditionError, Stoplight::Error::RedLight, ActiveRecord::SerializationFailure, with: :service_unavailable
|
|
|
|
rescue_from Seahorse::Client::NetworkingError do |e|
|
|
Rails.logger.warn "Storage server error: #{e}"
|
|
service_unavailable
|
|
end
|
|
|
|
before_action :check_self_destruct!
|
|
|
|
before_action :store_referrer, except: :raise_not_found, if: :devise_controller?
|
|
before_action :require_functional!, if: :user_signed_in?
|
|
|
|
before_action :set_cache_control_defaults
|
|
|
|
skip_before_action :verify_authenticity_token, only: :raise_not_found
|
|
|
|
def raise_not_found
|
|
raise ActionController::RoutingError, "No route matches #{params[:unmatched_route]}"
|
|
end
|
|
|
|
private
|
|
|
|
def public_fetch_mode?
|
|
!authorized_fetch_mode?
|
|
end
|
|
|
|
def store_referrer
|
|
return if request.referer.blank?
|
|
|
|
redirect_uri = URI(request.referer)
|
|
return if redirect_uri.path.start_with?('/auth')
|
|
|
|
stored_url = redirect_uri.to_s if redirect_uri.host == request.host && redirect_uri.port == request.port
|
|
|
|
store_location_for(:user, stored_url)
|
|
end
|
|
|
|
def require_functional!
|
|
redirect_to edit_user_registration_path unless current_user.functional?
|
|
end
|
|
|
|
def skip_csrf_meta_tags?
|
|
false
|
|
end
|
|
|
|
def after_sign_out_path_for(_resource_or_scope)
|
|
if ENV['OMNIAUTH_ONLY'] == 'true' && ENV['OIDC_ENABLED'] == 'true'
|
|
'/auth/auth/openid_connect/logout'
|
|
else
|
|
new_user_session_path
|
|
end
|
|
end
|
|
|
|
protected
|
|
|
|
def truthy_param?(key)
|
|
ActiveModel::Type::Boolean.new.cast(params[key])
|
|
end
|
|
|
|
def forbidden
|
|
respond_with_error(403)
|
|
end
|
|
|
|
def not_found
|
|
respond_with_error(404)
|
|
end
|
|
|
|
def gone
|
|
respond_with_error(410)
|
|
end
|
|
|
|
def unprocessable_entity
|
|
respond_with_error(422)
|
|
end
|
|
|
|
def not_acceptable
|
|
respond_with_error(406)
|
|
end
|
|
|
|
def bad_request
|
|
respond_with_error(400)
|
|
end
|
|
|
|
def internal_server_error
|
|
respond_with_error(500)
|
|
end
|
|
|
|
def service_unavailable
|
|
respond_with_error(503)
|
|
end
|
|
|
|
def too_many_requests
|
|
respond_with_error(429)
|
|
end
|
|
|
|
def single_user_mode?
|
|
@single_user_mode ||= Rails.configuration.x.single_user_mode && Account.without_internal.exists?
|
|
end
|
|
|
|
def use_seamless_external_login?
|
|
Devise.pam_authentication || Devise.ldap_authentication
|
|
end
|
|
|
|
def omniauth_only?
|
|
ENV['OMNIAUTH_ONLY'] == 'true'
|
|
end
|
|
|
|
def sso_account_settings
|
|
ENV.fetch('SSO_ACCOUNT_SETTINGS', nil)
|
|
end
|
|
|
|
def current_account
|
|
return @current_account if defined?(@current_account)
|
|
|
|
@current_account = current_user&.account
|
|
end
|
|
|
|
def current_session
|
|
return @current_session if defined?(@current_session)
|
|
|
|
@current_session = SessionActivation.find_by(session_id: cookies.signed['_session_id']) if cookies.signed['_session_id'].present?
|
|
end
|
|
|
|
def current_theme
|
|
return Setting.theme unless Themes.instance.names.include? current_user&.setting_theme
|
|
|
|
current_user.setting_theme
|
|
end
|
|
|
|
def body_class_string
|
|
@body_classes || ''
|
|
end
|
|
|
|
def respond_with_error(code)
|
|
respond_to do |format|
|
|
format.any { render "errors/#{code}", layout: 'error', status: code, formats: [:html] }
|
|
format.json { render json: { error: Rack::Utils::HTTP_STATUS_CODES[code] }, status: code }
|
|
end
|
|
end
|
|
|
|
def check_self_destruct!
|
|
return unless self_destruct?
|
|
|
|
respond_to do |format|
|
|
format.any { render 'errors/self_destruct', layout: 'auth', status: 410, formats: [:html] }
|
|
format.json { render json: { error: Rack::Utils::HTTP_STATUS_CODES[410] }, status: 410 }
|
|
end
|
|
end
|
|
|
|
def set_cache_control_defaults
|
|
response.cache_control.replace(private: true, no_store: true)
|
|
end
|
|
end
|