- # frozen_string_literal: true
-
- class ApplicationController < ActionController::Base
- # Prevent CSRF attacks by raising an exception.
- # For APIs, you may want to use :null_session instead.
- protect_from_forgery with: :exception
-
- force_ssl if: :https_enabled?
-
- include Localized
- include UserTrackingConcern
- include SessionTrackingConcern
- include CacheConcern
- include DomainControlHelper
-
- helper_method :current_account
- helper_method :current_session
- helper_method :current_theme
- helper_method :single_user_mode?
- helper_method :use_seamless_external_login?
- helper_method :whitelist_mode?
-
- rescue_from ActionController::RoutingError, with: :not_found
- rescue_from ActionController::InvalidAuthenticityToken, with: :unprocessable_entity
- rescue_from ActionController::UnknownFormat, with: :not_acceptable
- rescue_from ActionController::ParameterMissing, with: :bad_request
- rescue_from Paperclip::AdapterRegistry::NoHandlerError, with: :bad_request
- rescue_from ActiveRecord::RecordNotFound, with: :not_found
- rescue_from Mastodon::NotPermittedError, with: :forbidden
- rescue_from HTTP::Error, OpenSSL::SSL::SSLError, with: :internal_server_error
- rescue_from Mastodon::RaceConditionError, with: :service_unavailable
- rescue_from Mastodon::RateLimitExceededError, with: :too_many_requests
-
- before_action :store_current_location, except: :raise_not_found, unless: :devise_controller?
- before_action :require_functional!, if: :user_signed_in?
-
- skip_before_action :verify_authenticity_token, only: :raise_not_found
-
- def raise_not_found
- raise ActionController::RoutingError, "No route matches #{params[:unmatched_route]}"
- end
-
- private
-
- def https_enabled?
- Rails.env.production? && !request.path.start_with?('/health')
- end
-
- def authorized_fetch_mode?
- ENV['AUTHORIZED_FETCH'] == 'true' || Rails.configuration.x.whitelist_mode
- end
-
- def public_fetch_mode?
- !authorized_fetch_mode?
- end
-
- def store_current_location
- store_location_for(:user, request.url) unless [:json, :rss].include?(request.format&.to_sym)
- end
-
- def require_admin!
- forbidden unless current_user&.admin?
- end
-
- def require_staff!
- forbidden unless current_user&.staff?
- end
-
- def require_functional!
- redirect_to edit_user_registration_path unless current_user.functional?
- end
-
- def after_sign_out_path_for(_resource_or_scope)
- new_user_session_path
- end
-
- protected
-
- def truthy_param?(key)
- ActiveModel::Type::Boolean.new.cast(params[key])
- end
-
- def forbidden
- respond_with_error(403)
- end
-
- def not_found
- respond_with_error(404)
- end
-
- def gone
- respond_with_error(410)
- end
-
- def unprocessable_entity
- respond_with_error(422)
- end
-
- def not_acceptable
- respond_with_error(406)
- end
-
- def bad_request
- respond_with_error(400)
- end
-
- def internal_server_error
- respond_with_error(500)
- end
-
- def service_unavailable
- respond_with_error(503)
- end
-
- def too_many_requests
- respond_with_error(429)
- end
-
- def single_user_mode?
- @single_user_mode ||= Rails.configuration.x.single_user_mode && Account.where('id > 0').exists?
- end
-
- def use_seamless_external_login?
- Devise.pam_authentication || Devise.ldap_authentication
- end
-
- def current_account
- return @current_account if defined?(@current_account)
-
- @current_account = current_user&.account
- end
-
- def current_session
- return @current_session if defined?(@current_session)
-
- @current_session = SessionActivation.find_by(session_id: cookies.signed['_session_id']) if cookies.signed['_session_id'].present?
- end
-
- def current_theme
- return Setting.theme unless Themes.instance.names.include? current_user&.setting_theme
- current_user.setting_theme
- end
-
- def respond_with_error(code)
- respond_to do |format|
- format.any { render "errors/#{code}", layout: 'error', status: code, formats: [:html] }
- format.json { render json: { error: Rack::Utils::HTTP_STATUS_CODES[code] }, status: code }
- end
- end
- end
|