1 class ApplicationController < ActionController::Base
2 respond_to :html, :json, :js
4 around_filter :thread_clear
5 around_filter :thread_with_api_token, :except => [:render_exception, :render_not_found]
6 before_filter :find_object_by_uuid, :except => [:index, :render_exception, :render_not_found]
7 before_filter :check_user_agreements, :except => [:render_exception, :render_not_found]
8 before_filter :check_user_notifications, :except => [:render_exception, :render_not_found]
12 rescue_from Exception,
13 :with => :render_exception
14 rescue_from ActiveRecord::RecordNotFound,
15 :with => :render_not_found
16 rescue_from ActionController::RoutingError,
17 :with => :render_not_found
18 rescue_from ActionController::UnknownController,
19 :with => :render_not_found
20 rescue_from ::AbstractController::ActionNotFound,
21 :with => :render_not_found
24 def unprocessable(message=nil)
26 @errors << message if message
27 render_error status: 422
30 def render_error(opts)
32 # json must come before html here, so it gets used as the
33 # default format when js is requested by the client. This lets
34 # ajax:error callback parse the response correctly, even though
36 f.json { render opts.merge(json: {success: false, errors: @errors}) }
37 f.html { render opts.merge(controller: 'application', action: 'error') }
41 def render_exception(e)
42 logger.error e.inspect
43 logger.error e.backtrace.collect { |x| x + "\n" }.join('') if e.backtrace
44 if @object.andand.errors.andand.full_messages.andand.any?
45 @errors = @object.errors.full_messages
49 self.render_error status: 422
52 def render_not_found(e=ActionController::RoutingError.new("Path not found"))
53 logger.error e.inspect
54 @errors = ["Path not found"]
55 self.render_error status: 404
59 @objects ||= model_class.limit(1000).all
61 f.json { render json: @objects }
69 return render_not_found("object not found")
72 f.json { render json: @object }
74 if request.method == 'GET'
77 redirect_to params[:return_to] || @object
86 return render_not_found("object not found")
91 @object = model_class.new
95 updates = params[@object.class.to_s.underscore.singularize.to_sym]
96 updates.keys.each do |attr|
97 if @object.send(attr).is_a? Hash and updates[attr].is_a? String
98 updates[attr] = Oj.load updates[attr]
101 if @object.update_attributes updates
104 self.render_error status: 422
109 @object ||= model_class.new params[model_class.to_s.singularize.to_sym]
111 redirect_to(params[:return_to] || @object)
118 redirect_to(params[:return_to] || :back)
123 self.render_error status: 422
128 if Thread.current[:arvados_api_token]
129 Thread.current[:user] ||= User.current
131 logger.error "No API token in Thread"
137 controller_name.classify.constantize
140 def breadcrumb_page_name
141 (@breadcrumb_page_name ||
142 (@object.friendly_link_name if @object.respond_to? :friendly_link_name))
150 %w(attributes metadata json api)
155 def find_object_by_uuid
156 if params[:id] and params[:id].match /\D/
157 params[:uuid] = params.delete :id
159 if params[:uuid].is_a? String
160 @object = model_class.find(params[:uuid])
162 @object = model_class.where(uuid: params[:uuid]).first
167 Thread.current[:arvados_api_token] = nil
168 Thread.current[:user] = nil
169 Rails.cache.delete_matched(/^request_#{Thread.current.object_id}_/)
171 Rails.cache.delete_matched(/^request_#{Thread.current.object_id}_/)
174 def thread_with_api_token(login_optional = false)
176 try_redirect_to_login = true
177 if params[:api_token]
178 try_redirect_to_login = false
179 Thread.current[:arvados_api_token] = params[:api_token]
180 # Before copying the token into session[], do a simple API
181 # call to verify its authenticity.
183 session[:arvados_api_token] = params[:api_token]
184 if !request.format.json? and request.method == 'GET'
185 # Repeat this request with api_token in the (new) session
186 # cookie instead of the query string. This prevents API
187 # tokens from appearing in (and being inadvisedly copied
188 # and pasted from) browser Location bars.
189 redirect_to request.fullpath.sub(%r{([&\?]api_token=)[^&\?]*}, '')
194 @errors = ['Invalid API token']
195 self.render_error status: 401
197 elsif session[:arvados_api_token]
198 # In this case, the token must have already verified at some
199 # point, but it might have been revoked since. We'll try
200 # using it, and catch the exception if it doesn't work.
201 try_redirect_to_login = false
202 Thread.current[:arvados_api_token] = session[:arvados_api_token]
205 rescue ArvadosApiClient::NotLoggedInException
206 try_redirect_to_login = true
209 logger.debug "No token received, session is #{session.inspect}"
211 if try_redirect_to_login
212 unless login_optional
215 if request.method == 'GET'
216 redirect_to $arvados_api_client.arvados_login_url(return_to: request.url)
218 flash[:error] = "Either you are not logged in, or your session has timed out. I can't automatically log you in and re-attempt this request."
223 @errors = ['You do not seem to be logged in. You did not supply an API token with this request, and your session (if any) has timed out.']
224 self.render_error status: 422
228 # login is optional for this route so go on to the regular controller
229 Thread.current[:arvados_api_token] = nil
234 # Remove token in case this Thread is used for anything else.
235 Thread.current[:arvados_api_token] = nil
239 def thread_with_optional_api_token
240 thread_with_api_token(true) do
247 Link.where(uuid: 'just-verifying-my-api-token')
249 rescue ArvadosApiClient::NotLoggedInException
254 def ensure_current_user_is_admin
255 unless current_user and current_user.is_admin
256 @errors = ['Permission denied']
257 self.render_error status: 401
261 def check_user_agreements
262 if current_user && !current_user.is_active && current_user.is_invited
263 signatures = UserAgreement.signatures
264 @signed_ua_uuids = UserAgreement.signatures.map &:head_uuid
265 @required_user_agreements = UserAgreement.all.map do |ua|
266 if not @signed_ua_uuids.index ua.uuid
267 Collection.find(ua.uuid)
270 if @required_user_agreements.empty?
271 # No agreements to sign. Perhaps we just need to ask?
272 current_user.activate
273 if !current_user.is_active
274 logger.warn "#{current_user.uuid.inspect}: " +
275 "No user agreements to sign, but activate failed!"
278 if !current_user.is_active
279 render 'user_agreements/index'
286 return Rails.configuration.arvados_theme
289 @@notification_tests = []
291 @@notification_tests.push lambda { |controller, current_user|
292 AuthorizedKey.limit(1).where(authorized_user_uuid: current_user.uuid).each do
295 return lambda { |view|
296 view.render partial: 'notifications/ssh_key_notification'
300 @@notification_tests.push lambda { |controller, current_user|
301 AuthorizedKey.limit(1).where(authorized_user_uuid: current_user.uuid).each do
304 return lambda { |view|
305 view.render partial: 'notifications/jobs_notification'
309 @@notification_tests.push lambda { |controller, current_user|
310 Job.limit(1).where(created_by: current_user.uuid).each do
313 return lambda { |view|
314 view.render partial: 'notifications/jobs_notification'
318 @@notification_tests.push lambda { |controller, current_user|
319 Collection.limit(1).where(created_by: current_user.uuid).each do
322 return lambda { |view|
323 view.render partial: 'notifications/collections_notification'
327 @@notification_tests.push lambda { |controller, current_user|
328 PipelineInstance.limit(1).where(created_by: current_user.uuid).each do
331 return lambda { |view|
332 view.render partial: 'notifications/pipelines_notification'
336 def check_user_notifications
337 @notification_count = 0
341 @showallalerts = false
342 @@notification_tests.each do |t|
343 a = t.call(self, current_user)
345 @notification_count += 1
346 @notifications.push a
351 if @notification_count == 0
352 @notification_count = ''