mirror of
https://github.com/LaCasemate/fab-manager.git
synced 2024-12-10 21:24:20 +01:00
110 lines
4.2 KiB
Ruby
110 lines
4.2 KiB
Ruby
# frozen_string_literal: true
|
|
|
|
# API Controller for resources of type AuthProvider
|
|
# AuthProvider are used to connect users through single-sign on systems
|
|
class API::AuthProvidersController < API::ApiController
|
|
|
|
before_action :set_provider, only: %i[show update destroy]
|
|
def index
|
|
@providers = policy_scope(AuthProvider)
|
|
end
|
|
|
|
def create
|
|
authorize AuthProvider
|
|
@provider = AuthProvider.new(provider_params)
|
|
AuthProviderService.auto_configure(@provider)
|
|
if @provider.save
|
|
render :show, status: :created, location: @provider
|
|
else
|
|
render json: @provider.errors, status: :unprocessable_entity
|
|
end
|
|
end
|
|
|
|
def update
|
|
authorize AuthProvider
|
|
if @provider.update(provider_params)
|
|
render :show, status: :ok, location: @provider
|
|
else
|
|
render json: @provider.errors, status: :unprocessable_entity
|
|
end
|
|
end
|
|
|
|
def strategy_name
|
|
authorize AuthProvider
|
|
@provider = AuthProvider.new(providable_type: params[:providable_type], name: params[:name])
|
|
render json: @provider.strategy_name
|
|
end
|
|
|
|
def show
|
|
authorize AuthProvider
|
|
end
|
|
|
|
def destroy
|
|
authorize AuthProvider
|
|
if @provider.safe_destroy
|
|
head :no_content
|
|
else
|
|
render json: @provider.errors, status: :unprocessable_entity
|
|
end
|
|
end
|
|
|
|
def mapping_fields
|
|
authorize AuthProvider
|
|
render :mapping_fields, status: :ok
|
|
end
|
|
|
|
def active
|
|
authorize AuthProvider
|
|
@provider = AuthProvider.active
|
|
@previous = AuthProvider.previous
|
|
end
|
|
|
|
def send_code
|
|
authorize AuthProvider
|
|
user = User.find_by('lower(email) = ?', params[:email]&.downcase)
|
|
|
|
if user&.auth_token
|
|
if AuthProvider.active.providable_type != DatabaseProvider.name
|
|
NotificationCenter.call type: 'notify_user_auth_migration',
|
|
receiver: user,
|
|
attached_object: user
|
|
render json: { status: 'processing' }, status: :ok
|
|
else
|
|
render json: { status: 'error', error: I18n.t('members.current_authentication_method_no_code') }, status: :bad_request
|
|
end
|
|
else
|
|
render json: { status: 'error', error: I18n.t('members.requested_account_does_not_exists') }, status: :bad_request
|
|
end
|
|
end
|
|
|
|
private
|
|
|
|
def set_provider
|
|
@provider = AuthProvider.find(params[:id])
|
|
end
|
|
|
|
def provider_params
|
|
if params['auth_provider']['providable_type'] == DatabaseProvider.name
|
|
params.require(:auth_provider).permit(:id, :name, :providable_type, providable_attributes: [:id])
|
|
elsif params['auth_provider']['providable_type'] == OAuth2Provider.name
|
|
params.require(:auth_provider)
|
|
.permit(:id, :name, :providable_type,
|
|
providable_attributes: %i[id base_url token_endpoint authorization_endpoint
|
|
profile_url client_id client_secret scopes],
|
|
auth_provider_mappings_attributes: [:id, :local_model, :local_field, :api_field, :api_endpoint, :api_data_type,
|
|
:_destroy, transformation: [:type, :format, :true_value, :false_value,
|
|
mapping: %i[from to]]])
|
|
elsif params['auth_provider']['providable_type'] == OpenIdConnectProvider.name
|
|
params.require(:auth_provider)
|
|
.permit(:id, :name, :providable_type,
|
|
providable_attributes: [:id, :issuer, :discovery, :client_auth_method, :prompt, :send_scope_to_token_endpoint,
|
|
:client__identifier, :client__secret, :client__authorization_endpoint, :client__token_endpoint,
|
|
:client__userinfo_endpoint, :client__jwks_uri, :client__end_session_endpoint, :profile_url,
|
|
scope: []],
|
|
auth_provider_mappings_attributes: [:id, :local_model, :local_field, :api_field, :api_endpoint, :api_data_type,
|
|
:_destroy, transformation: [:type, :format, :true_value, :false_value,
|
|
mapping: %i[from to]]])
|
|
end
|
|
end
|
|
end
|