1 class UsersController < ApplicationController
2 skip_around_filter :require_thread_api_token, only: :welcome
3 skip_before_filter :check_user_agreements, only: [:welcome, :inactive]
4 skip_before_filter :check_user_profile, only: [:welcome, :inactive, :profile]
5 skip_before_filter :find_object_by_uuid, only: [:welcome, :activity, :storage]
6 before_filter :ensure_current_user_is_admin, only: [:sudo, :unsetup, :setup]
9 if params[:uuid] == current_user.uuid
12 if request.url.include?("/users/#{current_user.uuid}")
15 redirect_to(params[:return_to] || project_path(params[:uuid]))
26 redirect_to (params[:return_to] || '/')
31 if current_user.andand.is_invited
32 redirect_to (params[:return_to] || '/')
37 params[:offer_return_to] ||= params[:return_to]
41 @breadcrumb_page_name = nil
42 @users = User.limit(params[:limit])
47 pipeline_instances: {}
50 @spans = [['This week', Time.now.beginning_of_week, Time.now],
52 Time.now.beginning_of_week.advance(weeks:-1),
53 Time.now.beginning_of_week],
54 ['This month', Time.now.beginning_of_month, Time.now],
56 1.month.ago.beginning_of_month,
57 Time.now.beginning_of_month]]
58 @spans.each do |span, threshold_start, threshold_end|
59 @activity[:logins][span] = Log.select(%w(uuid modified_by_user_uuid)).
60 filter([[:event_type, '=', 'login'],
61 [:object_kind, '=', 'arvados#user'],
62 [:created_at, '>=', threshold_start],
63 [:created_at, '<', threshold_end]])
64 @activity[:jobs][span] = Job.select(%w(uuid modified_by_user_uuid)).
65 filter([[:created_at, '>=', threshold_start],
66 [:created_at, '<', threshold_end]])
67 @activity[:pipeline_instances][span] = PipelineInstance.select(%w(uuid modified_by_user_uuid)).
68 filter([[:created_at, '>=', threshold_start],
69 [:created_at, '<', threshold_end]])
70 @activity.each do |type, act|
73 @user_activity[u.uuid] ||= {}
74 @user_activity[u.uuid][span + ' ' + type.to_s] ||= 0
76 records.each do |record|
77 @user_activity[record.modified_by_user_uuid] ||= {}
78 @user_activity[record.modified_by_user_uuid][span + ' ' + type.to_s] ||= 0
79 @user_activity[record.modified_by_user_uuid][span + ' ' + type.to_s] += 1
80 @total_activity[span + ' ' + type.to_s] ||= 0
81 @total_activity[span + ' ' + type.to_s] += 1
85 @users = @users.sort_by do |a|
86 [-@user_activity[a.uuid].values.inject(:+), a.full_name]
88 # Prepend a "Total" pseudo-user to the sorted list
89 @user_activity[nil] = @total_activity
90 @users = [OpenStruct.new(uuid: nil)] + @users
94 @breadcrumb_page_name = nil
95 @users = User.limit(params[:limit])
100 @user_storage[u.uuid] ||= {}
102 filter([[:object_uuid, '=', u.uuid],
103 [:event_type, '=', 'user-storage-report']]).
104 order(:created_at => :desc).
106 storage_log.each do |log_entry|
107 # We expect this block to only execute once since we specified limit(1)
108 @user_storage[u.uuid] = log_entry['properties']
109 @log_date[u.uuid] = log_entry['event_at']
111 total_storage.merge!(@user_storage[u.uuid]) { |k,v1,v2| v1 + v2 }
113 @users = @users.sort_by { |u|
114 [-@user_storage[u.uuid].values.push(0).inject(:+), u.full_name]}
115 # Prepend a "Total" pseudo-user to the sorted list
116 @users = [OpenStruct.new(uuid: nil)] + @users
117 @user_storage[nil] = total_storage
121 if current_user.andand.is_admin
129 if current_user.andand.is_admin
137 resp = arvados_api_client.api(ApiClientAuthorization, '', {
138 api_client_authorization: {
139 owner_uuid: @object.uuid
142 redirect_to root_url(api_token: resp[:api_token])
146 @my_ssh_keys = AuthorizedKey.where(authorized_user_uuid: current_user.uuid)
151 order('created_at desc').
152 where(created_by: current_user.uuid)
154 @my_collections = Collection.
156 order('created_at desc').
157 where(created_by: current_user.uuid)
158 collection_uuids = @my_collections.collect &:uuid
161 collection_uuids.each do |uuid|
162 @persist_state[uuid] = 'cache'
165 Link.filter([['head_uuid', 'in', collection_uuids],
166 ['link_class', 'in', ['tag', 'resources']]]).
170 (@my_tag_links[link.head_uuid] ||= []) << link
172 if link.name == 'wants'
173 @persist_state[link.head_uuid] = 'persistent'
178 @my_pipelines = PipelineInstance.
180 order('created_at desc').
181 where(created_by: current_user.uuid)
184 f.js { render template: 'users/home.js' }
185 f.html { render template: 'users/home' }
190 if current_user.andand.is_admin
197 respond_to do |format|
198 if current_user.andand.is_admin
200 setup_params[:send_notification_email] = "#{Rails.configuration.send_user_setup_notification_email}"
201 if params['user_uuid'] && params['user_uuid'].size>0
202 setup_params[:uuid] = params['user_uuid']
204 if params['email'] && params['email'].size>0
205 user = {email: params['email']}
206 setup_params[:user] = user
208 if params['openid_prefix'] && params['openid_prefix'].size>0
209 setup_params[:openid_prefix] = params['openid_prefix']
211 if params['vm_uuid'] && params['vm_uuid'].size>0
212 setup_params[:vm_uuid] = params['vm_uuid']
215 setup_resp = User.setup setup_params
218 setup_resp[:items].each do |item|
219 if item[:head_kind] == "arvados#virtualMachine"
225 new_groups = params[:groups].split(',').map(&:strip).select{|i| !i.empty?}
226 if vm_link and new_groups != vm_link[:properties][:groups]
227 vm_login_link = Link.where(uuid: vm_link[:uuid])
228 if vm_login_link.items_available > 0
229 link = vm_login_link.results.first
230 props = link.properties
231 props[:groups] = new_groups
239 self.render_error status: 422
242 self.render_error status: 422
248 @vms = VirtualMachine.all.results
250 @current_selections = find_current_links @object
252 respond_to do |format|
259 # repositories current user can read / write
261 filter([['head_uuid', 'is_a', 'arvados#repository'],
262 ['tail_uuid', '=', current_user.uuid],
263 ['link_class', '=', 'permission'],
266 owned_repositories = Repository.where(owner_uuid: current_user.uuid)
268 @my_repositories = (Repository.where(uuid: repo_links.collect(&:head_uuid)) |
270 uniq { |repo| repo.uuid }
274 repo_links.each do |link|
275 if link.name.in? ['can_write', 'can_manage']
276 @repo_writable[link.head_uuid] = link.name
280 owned_repositories.each do |repo|
281 @repo_writable[repo.uuid] = 'can_manage'
284 # virtual machines the current user can login into
286 Link.where(tail_uuid: current_user.uuid,
287 link_class: 'permission',
290 if perm_link.properties.andand[:username]
291 @my_vm_logins[perm_link.head_uuid] ||= []
292 @my_vm_logins[perm_link.head_uuid] << perm_link.properties[:username]
295 @my_virtual_machines = VirtualMachine.where(uuid: @my_vm_logins.keys)
297 # current user's ssh keys
298 @my_ssh_keys = AuthorizedKey.where(key_type: 'SSH', owner_uuid: current_user.uuid)
301 f.html { render template: 'users/manage_account' }
305 def add_ssh_key_popup
306 respond_to do |format|
313 respond_to do |format|
314 key_params = {'key_type' => 'SSH'}
315 key_params['authorized_user_uuid'] = current_user.uuid
317 if params['name'] && params['name'].size>0
318 key_params['name'] = params['name'].strip
320 if params['public_key'] && params['public_key'].size>0
321 key_params['public_key'] = params['public_key'].strip
324 if !key_params['name'] && params['public_key'].andand.size>0
325 split_key = key_params['public_key'].split
326 key_params['name'] = split_key[-1] if (split_key.size == 3)
329 new_key = AuthorizedKey.create! key_params
333 self.render_error status: 422
338 def request_shell_access
339 logger.warn "request_access: #{params.inspect}"
340 params['request_url'] = request.url
341 RequestShellAccessReporter.send_request(current_user, params).deliver
346 def find_current_links user
347 current_selections = {}
350 return current_selections
354 oid_login_perms = Link.where(tail_uuid: user.email,
355 head_kind: 'arvados#user',
356 link_class: 'permission',
359 if oid_login_perms.any?
360 prefix_properties = oid_login_perms.first.properties
361 current_selections[:identity_url_prefix] = prefix_properties[:identity_url_prefix]
365 repo_perms = Link.where(tail_uuid: user.uuid,
366 head_kind: 'arvados#repository',
367 link_class: 'permission',
370 repo_uuid = repo_perms.first.head_uuid
371 repos = Repository.where(head_uuid: repo_uuid)
373 repo_name = repos.first.name
374 current_selections[:repo_name] = repo_name
379 vm_login_perms = Link.where(tail_uuid: user.uuid,
380 head_kind: 'arvados#virtualMachine',
381 link_class: 'permission',
383 if vm_login_perms.any?
384 vm_perm = vm_login_perms.first
385 vm_uuid = vm_perm.head_uuid
386 current_selections[:vm_uuid] = vm_uuid
387 current_selections[:groups] = vm_perm.properties[:groups].andand.join(', ')
390 return current_selections