2021-06-01 12:20:20 +00:00
|
|
|
# Copyright (C) 2012-2021 Zammad Foundation, http://zammad-foundation.org/
|
|
|
|
|
2020-05-28 13:28:07 +00:00
|
|
|
class ExternalCredential::Google
|
|
|
|
|
|
|
|
def self.app_verify(params)
|
|
|
|
request_account_to_link(params, false)
|
|
|
|
params
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.request_account_to_link(credentials = {}, app_required = true)
|
|
|
|
external_credential = ExternalCredential.find_by(name: 'google')
|
|
|
|
raise Exceptions::UnprocessableEntity, 'No Google app configured!' if !external_credential && app_required
|
|
|
|
|
|
|
|
if external_credential
|
|
|
|
if credentials[:client_id].blank?
|
|
|
|
credentials[:client_id] = external_credential.credentials['client_id']
|
|
|
|
end
|
|
|
|
if credentials[:client_secret].blank?
|
|
|
|
credentials[:client_secret] = external_credential.credentials['client_secret']
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
raise Exceptions::UnprocessableEntity, 'No client_id param!' if credentials[:client_id].blank?
|
|
|
|
raise Exceptions::UnprocessableEntity, 'No client_secret param!' if credentials[:client_secret].blank?
|
|
|
|
|
|
|
|
authorize_url = generate_authorize_url(credentials[:client_id])
|
|
|
|
|
|
|
|
{
|
|
|
|
authorize_url: authorize_url,
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.link_account(_request_token, params)
|
|
|
|
external_credential = ExternalCredential.find_by(name: 'google')
|
|
|
|
raise Exceptions::UnprocessableEntity, 'No google app configured!' if !external_credential
|
|
|
|
raise Exceptions::UnprocessableEntity, 'No code for session found!' if !params[:code]
|
|
|
|
|
|
|
|
response = authorize_tokens(external_credential.credentials[:client_id], external_credential.credentials[:client_secret], params[:code])
|
|
|
|
%w[refresh_token access_token expires_in scope token_type id_token].each do |key|
|
|
|
|
raise Exceptions::UnprocessableEntity, "No #{key} for authorization request found!" if response[key.to_sym].blank?
|
|
|
|
end
|
|
|
|
|
|
|
|
user_data = user_info(response[:id_token])
|
|
|
|
raise Exceptions::UnprocessableEntity, 'Unable to extract user email from id_token!' if user_data[:email].blank?
|
|
|
|
|
|
|
|
channel_options = {
|
|
|
|
inbound: {
|
|
|
|
adapter: 'imap',
|
|
|
|
options: {
|
|
|
|
auth_type: 'XOAUTH2',
|
|
|
|
host: 'imap.gmail.com',
|
|
|
|
ssl: true,
|
|
|
|
user: user_data[:email],
|
|
|
|
},
|
|
|
|
},
|
|
|
|
outbound: {
|
|
|
|
adapter: 'smtp',
|
|
|
|
options: {
|
|
|
|
host: 'smtp.gmail.com',
|
|
|
|
port: 465,
|
|
|
|
ssl: true,
|
|
|
|
user: user_data[:email],
|
|
|
|
authentication: 'xoauth2',
|
|
|
|
},
|
|
|
|
},
|
|
|
|
auth: response.merge(
|
|
|
|
provider: 'google',
|
|
|
|
type: 'XOAUTH2',
|
|
|
|
client_id: external_credential.credentials[:client_id],
|
|
|
|
client_secret: external_credential.credentials[:client_secret],
|
|
|
|
),
|
|
|
|
}
|
|
|
|
|
2020-11-20 13:58:57 +00:00
|
|
|
if params[:channel_id]
|
|
|
|
existing_channel = Channel.where(area: 'Google::Account').find(params[:channel_id])
|
|
|
|
|
|
|
|
existing_channel.update!(
|
|
|
|
options: channel_options,
|
|
|
|
)
|
|
|
|
|
|
|
|
existing_channel.refresh_xoauth2!
|
|
|
|
|
|
|
|
return existing_channel
|
|
|
|
end
|
|
|
|
|
|
|
|
migrate_channel = nil
|
|
|
|
Channel.where(area: 'Email::Account').find_each do |channel|
|
2022-02-10 12:09:57 +00:00
|
|
|
next if channel.options.dig(:inbound, :options, :host)&.downcase != 'imap.gmail.com'
|
|
|
|
next if channel.options.dig(:outbound, :options, :host)&.downcase != 'smtp.gmail.com'
|
2022-02-10 16:24:35 +00:00
|
|
|
next if channel.options.dig(:outbound, :options, :user)&.downcase != user_data[:email].downcase && channel.options.dig(:outbound, :email)&.downcase != user_data[:email].downcase
|
2020-11-20 13:58:57 +00:00
|
|
|
|
|
|
|
migrate_channel = channel
|
|
|
|
|
|
|
|
break
|
|
|
|
end
|
|
|
|
|
2020-05-28 13:28:07 +00:00
|
|
|
if migrate_channel
|
|
|
|
channel_options[:inbound][:options][:folder] = migrate_channel.options[:inbound][:options][:folder]
|
|
|
|
channel_options[:inbound][:options][:keep_on_server] = migrate_channel.options[:inbound][:options][:keep_on_server]
|
|
|
|
|
|
|
|
backup = {
|
|
|
|
attributes: {
|
|
|
|
area: migrate_channel.area,
|
|
|
|
options: migrate_channel.options,
|
|
|
|
last_log_in: migrate_channel.last_log_in,
|
|
|
|
last_log_out: migrate_channel.last_log_out,
|
|
|
|
status_in: migrate_channel.status_in,
|
|
|
|
status_out: migrate_channel.status_out,
|
|
|
|
},
|
|
|
|
migrated_at: Time.zone.now,
|
|
|
|
}
|
|
|
|
|
|
|
|
migrate_channel.update(
|
|
|
|
area: 'Google::Account',
|
|
|
|
options: channel_options.merge(backup_imap_classic: backup),
|
|
|
|
last_log_in: nil,
|
|
|
|
last_log_out: nil,
|
|
|
|
)
|
|
|
|
|
|
|
|
return migrate_channel
|
|
|
|
end
|
|
|
|
|
|
|
|
email_addresses = user_aliases(response)
|
|
|
|
email_addresses.unshift({
|
|
|
|
realname: "#{Setting.get('product_name')} Support",
|
|
|
|
email: user_data[:email],
|
|
|
|
})
|
|
|
|
|
|
|
|
email_addresses.each do |email|
|
|
|
|
next if !EmailAddress.exists?(email: email[:email])
|
|
|
|
|
|
|
|
raise Exceptions::UnprocessableEntity, "Duplicate email address or email alias #{email[:email]} found!"
|
|
|
|
end
|
|
|
|
|
|
|
|
# create channel
|
|
|
|
channel = Channel.create!(
|
|
|
|
area: 'Google::Account',
|
|
|
|
group_id: Group.first.id,
|
|
|
|
options: channel_options,
|
|
|
|
active: false,
|
|
|
|
created_by_id: 1,
|
|
|
|
updated_by_id: 1,
|
|
|
|
)
|
|
|
|
|
|
|
|
email_addresses.each do |user_alias|
|
|
|
|
EmailAddress.create!(
|
|
|
|
channel_id: channel.id,
|
|
|
|
realname: user_alias[:realname],
|
|
|
|
email: user_alias[:email],
|
|
|
|
active: true,
|
|
|
|
created_by_id: 1,
|
|
|
|
updated_by_id: 1,
|
|
|
|
)
|
|
|
|
end
|
|
|
|
|
|
|
|
channel
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.generate_authorize_url(client_id, scope = 'openid email profile https://mail.google.com/')
|
|
|
|
|
|
|
|
params = {
|
|
|
|
'client_id' => client_id,
|
|
|
|
'redirect_uri' => ExternalCredential.callback_url('google'),
|
|
|
|
'scope' => scope,
|
|
|
|
'response_type' => 'code',
|
|
|
|
'access_type' => 'offline',
|
|
|
|
'prompt' => 'consent',
|
|
|
|
}
|
|
|
|
|
|
|
|
uri = URI::HTTPS.build(
|
|
|
|
host: 'accounts.google.com',
|
|
|
|
path: '/o/oauth2/auth',
|
|
|
|
query: params.to_query
|
|
|
|
)
|
|
|
|
|
|
|
|
uri.to_s
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.authorize_tokens(client_id, client_secret, authorization_code)
|
|
|
|
params = {
|
|
|
|
'client_secret' => client_secret,
|
|
|
|
'code' => authorization_code,
|
|
|
|
'grant_type' => 'authorization_code',
|
|
|
|
'client_id' => client_id,
|
|
|
|
'redirect_uri' => ExternalCredential.callback_url('google'),
|
|
|
|
}
|
|
|
|
|
|
|
|
uri = URI::HTTPS.build(
|
|
|
|
host: 'accounts.google.com',
|
|
|
|
path: '/o/oauth2/token',
|
|
|
|
)
|
|
|
|
|
|
|
|
response = Net::HTTP.post_form(uri, params)
|
|
|
|
if response.code != 200 && response.body.blank?
|
|
|
|
Rails.logger.error "Request failed! (code: #{response.code})"
|
|
|
|
raise "Request failed! (code: #{response.code})"
|
|
|
|
end
|
|
|
|
|
|
|
|
result = JSON.parse(response.body)
|
|
|
|
if result['error'] && response.code != 200
|
|
|
|
Rails.logger.error "Request failed! ERROR: #{result['error']} (#{result['error_description']}, params: #{params.to_json})"
|
|
|
|
raise "Request failed! ERROR: #{result['error']} (#{result['error_description']})"
|
|
|
|
end
|
|
|
|
|
|
|
|
result[:created_at] = Time.zone.now
|
|
|
|
|
|
|
|
result.symbolize_keys
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.refresh_token(token)
|
|
|
|
return token if token[:created_at] >= 50.minutes.ago
|
|
|
|
|
|
|
|
params = {
|
|
|
|
'client_id' => token[:client_id],
|
|
|
|
'client_secret' => token[:client_secret],
|
|
|
|
'refresh_token' => token[:refresh_token],
|
|
|
|
'grant_type' => 'refresh_token',
|
|
|
|
}
|
|
|
|
uri = URI::HTTPS.build(
|
|
|
|
host: 'accounts.google.com',
|
|
|
|
path: '/o/oauth2/token',
|
|
|
|
)
|
|
|
|
|
|
|
|
response = Net::HTTP.post_form(uri, params)
|
|
|
|
if response.code != 200 && response.body.blank?
|
|
|
|
Rails.logger.error "Request failed! (code: #{response.code})"
|
|
|
|
raise "Request failed! (code: #{response.code})"
|
|
|
|
end
|
|
|
|
|
|
|
|
result = JSON.parse(response.body)
|
|
|
|
if result['error'] && response.code != 200
|
|
|
|
Rails.logger.error "Request failed! ERROR: #{result['error']} (#{result['error_description']}, params: #{params.to_json})"
|
|
|
|
raise "Request failed! ERROR: #{result['error']} (#{result['error_description']})"
|
|
|
|
end
|
|
|
|
|
|
|
|
token.merge(
|
|
|
|
created_at: Time.zone.now,
|
|
|
|
access_token: result['access_token'],
|
|
|
|
).symbolize_keys
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.user_aliases(token)
|
|
|
|
uri = URI.parse('https://www.googleapis.com/gmail/v1/users/me/settings/sendAs')
|
|
|
|
http = Net::HTTP.new(uri.host, uri.port)
|
|
|
|
http.use_ssl = true
|
|
|
|
response = http.get(uri.request_uri, { 'Authorization' => "#{token[:token_type]} #{token[:access_token]}" })
|
|
|
|
if response.code != 200 && response.body.blank?
|
|
|
|
Rails.logger.error "Request failed! (code: #{response.code})"
|
|
|
|
raise "Request failed! (code: #{response.code})"
|
|
|
|
end
|
|
|
|
|
|
|
|
result = JSON.parse(response.body)
|
|
|
|
if result['error'] && response.code != 200
|
|
|
|
Rails.logger.error "Request failed! ERROR: #{result['error']['message']}"
|
|
|
|
raise "Request failed! ERROR: #{result['error']['message']}"
|
|
|
|
end
|
|
|
|
|
|
|
|
aliases = []
|
|
|
|
result['sendAs'].each do |row|
|
|
|
|
next if row['isPrimary']
|
|
|
|
next if !row['verificationStatus']
|
|
|
|
next if row['verificationStatus'] != 'accepted'
|
|
|
|
|
|
|
|
aliases.push({
|
|
|
|
realname: row['displayName'],
|
|
|
|
email: row['sendAsEmail'],
|
|
|
|
})
|
|
|
|
end
|
|
|
|
|
|
|
|
aliases
|
|
|
|
end
|
|
|
|
|
|
|
|
def self.user_info(id_token)
|
|
|
|
split = id_token.split('.')[1]
|
|
|
|
return if split.blank?
|
|
|
|
|
|
|
|
JSON.parse(Base64.decode64(split)).symbolize_keys
|
|
|
|
end
|
|
|
|
|
|
|
|
end
|