# frozen_string_literal: true # API Controller for resources of type AuthProvider # AuthProvider are used to connect users through single-sign on systems class API::AuthProvidersController < API::ApiController before_action :set_provider, only: %i[show update destroy] def index @providers = policy_scope(AuthProvider) end def create authorize AuthProvider @provider = AuthProvider.new(provider_params) AuthProviderService.auto_configure(@provider) if @provider.save render :show, status: :created, location: @provider else render json: @provider.errors, status: :unprocessable_entity end end def update authorize AuthProvider if @provider.update(provider_params) render :show, status: :ok, location: @provider else render json: @provider.errors, status: :unprocessable_entity end end def strategy_name authorize AuthProvider @provider = AuthProvider.new(providable_type: params[:providable_type], name: params[:name]) render json: @provider.strategy_name end def show authorize AuthProvider end def destroy authorize AuthProvider if @provider.safe_destroy head :no_content else render json: @provider.errors, status: :unprocessable_entity end end def mapping_fields authorize AuthProvider render :mapping_fields, status: :ok end def active authorize AuthProvider @provider = AuthProvider.active @previous = AuthProvider.previous end def send_code authorize AuthProvider user = User.find_by('lower(email) = ?', params[:email]&.downcase) if user&.auth_token if AuthProvider.active.providable_type == DatabaseProvider.name render json: { status: 'error', error: I18n.t('members.current_authentication_method_no_code') }, status: :bad_request else NotificationCenter.call type: 'notify_user_auth_migration', receiver: user, attached_object: user render json: { status: 'processing' }, status: :ok end else render json: { status: 'error', error: I18n.t('members.requested_account_does_not_exists') }, status: :bad_request end end private def set_provider @provider = AuthProvider.find(params[:id]) end def provider_params if params['auth_provider']['providable_type'] == DatabaseProvider.name params.require(:auth_provider).permit(:id, :name, :providable_type, providable_attributes: [:id]) elsif params['auth_provider']['providable_type'] == OAuth2Provider.name params.require(:auth_provider) .permit(:id, :name, :providable_type, providable_attributes: %i[id base_url token_endpoint authorization_endpoint profile_url client_id client_secret scopes], auth_provider_mappings_attributes: [:id, :local_model, :local_field, :api_field, :api_endpoint, :api_data_type, :_destroy, { transformation: [:type, :format, :true_value, :false_value, { mapping: %i[from to] }] }]) elsif params['auth_provider']['providable_type'] == OpenIdConnectProvider.name params.require(:auth_provider) .permit(:id, :name, :providable_type, providable_attributes: [:id, :issuer, :discovery, :client_auth_method, :prompt, :send_scope_to_token_endpoint, :client__identifier, :client__secret, :client__authorization_endpoint, :client__token_endpoint, :client__userinfo_endpoint, :client__jwks_uri, :client__end_session_endpoint, :profile_url, { scope: [] }], auth_provider_mappings_attributes: [:id, :local_model, :local_field, :api_field, :api_endpoint, :api_data_type, :_destroy, { transformation: [:type, :format, :true_value, :false_value, { mapping: %i[from to] }] }]) end end end