2014-02-03 19:23:00 +00:00
|
|
|
# Copyright (C) 2012-2014 Zammad Foundation, http://zammad-foundation.org/
|
2013-06-12 15:59:58 +00:00
|
|
|
|
2012-04-23 06:55:16 +00:00
|
|
|
class Token < ActiveRecord::Base
|
2015-08-21 13:33:06 +00:00
|
|
|
before_create :generate_token
|
|
|
|
belongs_to :user
|
2012-04-23 06:55:16 +00:00
|
|
|
|
2015-08-21 13:33:06 +00:00
|
|
|
=begin
|
|
|
|
|
|
|
|
create new token
|
|
|
|
|
2016-06-01 14:58:11 +00:00
|
|
|
token = Token.create(action: 'PasswordReset', user_id: user.id)
|
2015-08-21 13:33:06 +00:00
|
|
|
|
|
|
|
returns
|
|
|
|
|
|
|
|
the token
|
|
|
|
|
|
|
|
create new persistent token
|
|
|
|
|
|
|
|
token = Token.create(
|
|
|
|
action: 'CalendarSubscriptions',
|
|
|
|
persistent: true,
|
|
|
|
user_id: user.id,
|
|
|
|
)
|
|
|
|
|
|
|
|
in case if you use it via an controller, e. g. you can verify via "curl -H "Authorization: Token token=33562a00d7eda2a7c2fb639b91c6bcb8422067b6" http://...
|
|
|
|
|
|
|
|
returns
|
|
|
|
|
|
|
|
the token
|
|
|
|
|
|
|
|
=end
|
|
|
|
|
|
|
|
=begin
|
|
|
|
|
|
|
|
check token
|
|
|
|
|
2016-06-01 14:58:11 +00:00
|
|
|
user = Token.check(action: 'PasswordReset', name: 'TheTokenItSelf')
|
2015-08-21 13:33:06 +00:00
|
|
|
|
|
|
|
returns
|
|
|
|
|
|
|
|
user for who this token was created
|
|
|
|
|
|
|
|
=end
|
2012-04-23 06:55:16 +00:00
|
|
|
|
2016-06-01 14:58:11 +00:00
|
|
|
def self.check(data)
|
2012-04-23 06:55:16 +00:00
|
|
|
|
|
|
|
# fetch token
|
2016-06-01 14:58:11 +00:00
|
|
|
token = Token.find_by(action: data[:action], name: data[:name])
|
2012-04-23 06:55:16 +00:00
|
|
|
return if !token
|
2013-06-12 15:59:58 +00:00
|
|
|
|
2012-04-23 06:55:16 +00:00
|
|
|
# check if token is still valid
|
2015-02-22 18:10:54 +00:00
|
|
|
if !token.persistent &&
|
2015-05-01 12:27:57 +00:00
|
|
|
token.created_at < 1.day.ago
|
2013-01-03 12:00:55 +00:00
|
|
|
|
2012-04-23 06:55:16 +00:00
|
|
|
# delete token
|
|
|
|
token.delete
|
|
|
|
token.save
|
|
|
|
return
|
|
|
|
end
|
2013-01-03 12:00:55 +00:00
|
|
|
|
2016-07-28 12:43:31 +00:00
|
|
|
user = token.user
|
|
|
|
|
|
|
|
# persistent token not valid if user is inative
|
|
|
|
return if token.persistent && user.active == false
|
|
|
|
|
2015-06-23 12:27:17 +00:00
|
|
|
# return token user
|
2016-07-28 12:43:31 +00:00
|
|
|
user
|
2012-04-23 06:55:16 +00:00
|
|
|
end
|
|
|
|
|
2015-08-24 10:09:04 +00:00
|
|
|
=begin
|
|
|
|
|
|
|
|
cleanup old token
|
|
|
|
|
|
|
|
Token.cleanup
|
|
|
|
|
|
|
|
=end
|
|
|
|
|
|
|
|
def self.cleanup
|
|
|
|
Token.where('persistent IS ? AND created_at < ?', nil, Time.zone.now - 30.days).delete_all
|
|
|
|
true
|
|
|
|
end
|
|
|
|
|
2012-04-23 06:55:16 +00:00
|
|
|
private
|
2015-05-01 12:31:46 +00:00
|
|
|
|
2013-06-12 15:59:58 +00:00
|
|
|
def generate_token
|
2015-05-05 10:32:25 +00:00
|
|
|
|
|
|
|
loop do
|
2016-07-28 10:09:32 +00:00
|
|
|
self.name = SecureRandom.urlsafe_base64(48)
|
2016-06-01 14:58:11 +00:00
|
|
|
break if !Token.exists?(name: name)
|
2015-05-05 10:32:25 +00:00
|
|
|
end
|
2013-06-12 15:59:58 +00:00
|
|
|
end
|
|
|
|
end
|