internetee-registry/app/controllers/repp/v1/base_controller.rb
2020-10-09 11:16:22 +03:00

81 lines
2.3 KiB
Ruby

module Repp
module V1
class BaseController < ActionController::API
rescue_from ActiveRecord::RecordNotFound, with: :not_found_error
before_action :authenticate_user
before_action :check_ip_restriction
attr_reader :current_user
rescue_from ActionController::ParameterMissing do |exception|
render json: { code: 2003, message: exception }, status: :bad_request
end
private
def epp_errors
@errors ||= []
end
def handle_errors(obj = nil, update: false)
@errors ||= []
if obj
obj.construct_epp_errors
@errors += obj.errors[:epp_errors]
end
if update
@errors.each_with_index do |errors, index|
if errors[:code] == '2304' &&
errors[:value].present? &&
errors[:value][:val] == DomainStatus::SERVER_DELETE_PROHIBITED &&
errors[:value][:obj] == 'status'
@errors[index][:value][:val] = DomainStatus::PENDING_UPDATE
end
end
end
@errors.uniq!
render_epp_error
end
def render_epp_error
render(json: { code: @errors[0][:code], message: @errors[0][:msg] }, status: :bad_request)
end
def ip_whitelisted?
return false unless current_user.registrar.api_ip_white?(request.ip)
end
def basic_token
pattern = /^Basic /
header = request.headers['Authorization']
header.gsub(pattern, '') if header&.match(pattern)
end
def authenticate_user
username, password = Base64.urlsafe_decode64(basic_token).split(':')
@current_user ||= ApiUser.find_by(username: username, plain_text_password: password)
return if @current_user
render(json: { errors: [{ base: ['Not authorized'] }] }, status: :unauthorized)
end
def check_ip_restriction
ip_restriction = Authorization::RestrictedIP.new(request.ip)
allowed = ip_restriction.can_access_registrar_area?(@current_user.registrar)
return if allowed
render(json: { errors: [{ base: [I18n.t('registrar.authorization.ip_not_allowed', ip: request.ip)] }] }, status: :unauthorized)
end
def not_found_error
render(json: { code: 2303, message: 'Object does not exist' }, status: :not_found)
end
end
end
end