1 module ApiTemplateOverride
2 def allowed_to_render?(fieldset, field, model, options)
4 return options[:select].include? field.to_s
10 class ActsAsApi::ApiTemplate
11 prepend ApiTemplateOverride
15 require 'record_filters'
17 class ApplicationController < ActionController::Base
18 include CurrentApiClient
19 include ThemesForRails::ActionController
26 ERROR_ACTIONS = [:render_error, :render_not_found]
28 before_filter :respond_with_json_by_default
29 before_filter :remote_ip
30 before_filter :load_read_auths
31 before_filter :require_auth_scope, except: ERROR_ACTIONS
33 before_filter :catch_redirect_hint
34 before_filter(:find_object_by_uuid,
35 except: [:index, :create] + ERROR_ACTIONS)
36 before_filter :load_limit_offset_order_params, only: [:index, :contents]
37 before_filter :load_where_param, only: [:index, :contents]
38 before_filter :load_filters_param, only: [:index, :contents]
39 before_filter :find_objects_for_index, :only => :index
40 before_filter :reload_object_before_update, :only => :update
41 before_filter(:render_404_if_no_object,
42 except: [:index, :create] + ERROR_ACTIONS)
46 attr_accessor :resource_attrs
49 rescue_from(Exception,
50 ArvadosModel::PermissionDeniedError,
51 :with => :render_error)
52 rescue_from(ActiveRecord::RecordNotFound,
53 ActionController::RoutingError,
54 ActionController::UnknownController,
55 AbstractController::ActionNotFound,
56 :with => :render_not_found)
60 @objects.uniq!(&:id) if @select.nil? or @select.include? "id"
61 if params[:eager] and params[:eager] != '0' and params[:eager] != 0 and params[:eager] != ''
62 @objects.each(&:eager_load_associations)
68 render json: @object.as_api_response(nil, select: @select)
72 @object = model_class.new resource_attrs
75 if @object.respond_to? :name and params[:ensure_unique_name]
76 # Record the original name. See below.
77 name_stem = @object.name
85 rescue ActiveRecord::RecordNotUnique => rn
86 # Dig into the error to determine if it is specifically calling out a
87 # (owner_uuid, name) uniqueness violation. In this specific case, and
88 # the client requested a unique name with ensure_unique_name==true,
89 # update the name field and try to save again. Loop as necessary to
90 # discover a unique name. It is necessary to handle name choosing at
91 # this level (as opposed to the client) to ensure that record creation
92 # never fails due to a race condition.
93 if rn.original_exception.is_a? PG::UniqueViolation
94 # Unfortunately ActiveRecord doesn't abstract out any of the
95 # necessary information to figure out if this the error is actually
96 # the specific case where we want to apply the ensure_unique_name
97 # behavior, so the following code is specialized to Postgres.
98 err = rn.original_exception
99 detail = err.result.error_field(PG::Result::PG_DIAG_MESSAGE_DETAIL)
100 if /^Key \(owner_uuid, name\)=\([a-z0-9]{5}-[a-z0-9]{5}-[a-z0-9]{15}, .*?\) already exists\./.match detail
101 logger.error "params[:ensure_unique_name] is #{params[:ensure_unique_name]}"
102 if params[:ensure_unique_name]
104 @object.name = "#{name_stem} (#{counter})"
118 attrs_to_update = resource_attrs.reject { |k,v|
119 [:kind, :etag, :href].index k
121 @object.update_attributes! attrs_to_update
130 def catch_redirect_hint
132 if params.has_key?('redirect_to') then
133 session[:redirect_to] = params[:redirect_to]
138 def render_404_if_no_object
139 render_not_found "Object not found" if !@object
143 logger.error e.inspect
144 if e.respond_to? :backtrace and e.backtrace
145 logger.error e.backtrace.collect { |x| x + "\n" }.join('')
147 if (@object.respond_to? :errors and
148 @object.errors.andand.full_messages.andand.any?)
149 errors = @object.errors.full_messages
150 logger.error errors.inspect
154 status = e.respond_to?(:http_status) ? e.http_status : 422
155 send_error(*errors, status: status)
158 def render_not_found(e=ActionController::RoutingError.new("Path not found"))
159 logger.error e.inspect
160 send_error("Path not found", status: 404)
165 def send_error(*args)
166 if args.last.is_a? Hash
171 err[:errors] ||= args
172 err[:error_token] = [Time.now.utc.to_i, "%08x" % rand(16 ** 8)].join("+")
173 status = err.delete(:status) || 422
174 logger.error "Error #{err[:error_token]}: #{status}"
175 render json: err, status: status
178 def find_objects_for_index
179 @objects ||= model_class.readable_by(*@read_users)
180 apply_where_limit_order_params
183 def apply_filters model_class=nil
184 model_class ||= self.model_class
185 ft = record_filters @filters, model_class
186 if ft[:cond_out].any?
187 @objects = @objects.where('(' + ft[:cond_out].join(') AND (') + ')',
192 def apply_where_limit_order_params *args
195 ar_table_name = @objects.table_name
196 if @where.is_a? Hash and @where.any?
198 @where.each do |attr,value|
199 if attr.to_s == 'any'
200 if value.is_a?(Array) and
201 value.length == 2 and
202 value[0] == 'contains' then
204 model_class.searchable_columns('ilike').each do |column|
205 # Including owner_uuid in an "any column" search will
206 # probably just return a lot of false positives.
207 next if column == 'owner_uuid'
208 ilikes << "#{ar_table_name}.#{column} ilike ?"
209 conditions << "%#{value[1]}%"
212 conditions[0] << ' and (' + ilikes.join(' or ') + ')'
215 elsif attr.to_s.match(/^[a-z][_a-z0-9]+$/) and
216 model_class.columns.collect(&:name).index(attr.to_s)
218 conditions[0] << " and #{ar_table_name}.#{attr} is ?"
220 elsif value.is_a? Array
221 if value[0] == 'contains' and value.length == 2
222 conditions[0] << " and #{ar_table_name}.#{attr} like ?"
223 conditions << "%#{value[1]}%"
225 conditions[0] << " and #{ar_table_name}.#{attr} in (?)"
228 elsif value.is_a? String or value.is_a? Fixnum or value == true or value == false
229 conditions[0] << " and #{ar_table_name}.#{attr}=?"
231 elsif value.is_a? Hash
232 # Not quite the same thing as "equal?" but better than nothing?
235 conditions[0] << " and #{ar_table_name}.#{attr} ilike ?"
236 conditions << "%#{k}%#{v}%"
242 if conditions.length > 1
243 conditions[0].sub!(/^1=1 and /, '')
250 unless action_name.in? %w(create update destroy)
251 # Map attribute names in @select to real column names, resolve
252 # those to fully-qualified SQL column names, and pass the
253 # resulting string to the select method.
254 api_column_map = model_class.attributes_required_columns
255 columns_list = @select.
256 flat_map { |attr| api_column_map[attr] }.
258 map { |s| "#{table_name}.#{ActiveRecord::Base.connection.quote_column_name s}" }
259 @objects = @objects.select(columns_list.join(", "))
262 # This information helps clients understand what they're seeing
263 # (Workbench always expects it), but they can't select it explicitly
264 # because it's not an SQL column. Always add it.
265 # (This is harmless, given that clients can deduce what they're
266 # looking at by the returned UUID anyway.)
269 @objects = @objects.order(@orders.join ", ") if @orders.any?
270 @objects = @objects.limit(@limit)
271 @objects = @objects.offset(@offset)
272 @objects = @objects.uniq(@distinct) if not @distinct.nil?
276 return @attrs if @attrs
277 @attrs = params[resource_name]
278 if @attrs.is_a? String
279 @attrs = Oj.load @attrs, symbol_keys: true
281 unless @attrs.is_a? Hash
282 message = "No #{resource_name}"
283 if resource_name.index('_')
284 message << " (or #{resource_name.camelcase(:lower)})"
286 message << " hash provided with request"
287 raise ArgumentError.new(message)
289 %w(created_at modified_by_client_uuid modified_by_user_uuid modified_at).each do |x|
290 @attrs.delete x.to_sym
292 @attrs = @attrs.symbolize_keys if @attrs.is_a? HashWithIndifferentAccess
299 if current_api_client_authorization
300 @read_auths << current_api_client_authorization
302 # Load reader tokens if this is a read request.
303 # If there are too many reader tokens, assume the request is malicious
305 if request.get? and params[:reader_tokens] and
306 params[:reader_tokens].size < 100
307 @read_auths += ApiClientAuthorization
309 .where('api_token IN (?) AND
310 (expires_at IS NULL OR expires_at > CURRENT_TIMESTAMP)',
311 params[:reader_tokens])
314 @read_auths.select! { |auth| auth.scopes_allow_request? request }
315 @read_users = @read_auths.map { |auth| auth.user }.uniq
320 respond_to do |format|
321 format.json { send_error("Not logged in", status: 401) }
322 format.html { redirect_to '/auth/joshid' }
329 unless current_user and current_user.is_admin
330 send_error("Forbidden", status: 403)
334 def require_auth_scope
335 if @read_auths.empty?
336 if require_login != false
337 send_error("Forbidden", status: 403)
343 def respond_with_json_by_default
344 html_index = request.accepts.index(Mime::HTML)
345 if html_index.nil? or request.accepts[0...html_index].include?(Mime::JSON)
346 request.format = :json
351 controller_name.classify.constantize
354 def resource_name # params[] key used by client
355 controller_name.singularize
362 def find_object_by_uuid
363 if params[:id] and params[:id].match /\D/
364 params[:uuid] = params.delete :id
366 @where = { uuid: params[:uuid] }
372 find_objects_for_index
373 @object = @objects.first
376 def reload_object_before_update
377 # This is necessary to prevent an ActiveRecord::ReadOnlyRecord
378 # error when updating an object which was retrieved using a join.
379 if @object.andand.readonly?
380 @object = model_class.find_by_uuid(@objects.first.uuid)
384 def load_json_value(hash, key, must_be_class=nil)
385 if hash[key].is_a? String
386 hash[key] = Oj.load(hash[key], symbol_keys: false)
387 if must_be_class and !hash[key].is_a? must_be_class
388 raise TypeError.new("parameter #{key.to_s} must be a #{must_be_class.to_s}")
393 def self.accept_attribute_as_json(attr, must_be_class=nil)
394 before_filter lambda { accept_attribute_as_json attr, must_be_class }
396 accept_attribute_as_json :properties, Hash
397 accept_attribute_as_json :info, Hash
398 def accept_attribute_as_json(attr, must_be_class)
399 if params[resource_name] and resource_attrs.is_a? Hash
400 if resource_attrs[attr].is_a? Hash
401 # Convert symbol keys to strings (in hashes provided by
403 resource_attrs[attr] = resource_attrs[attr].
404 with_indifferent_access.to_hash
406 load_json_value(resource_attrs, attr, must_be_class)
411 def self.accept_param_as_json(key, must_be_class=nil)
412 prepend_before_filter lambda { load_json_value(params, key, must_be_class) }
414 accept_param_as_json :reader_tokens, Array
418 :kind => "arvados##{(@response_resource_name || resource_name).camelize(:lower)}List",
423 :items => @objects.as_api_response(nil, {select: @select})
425 if @objects.respond_to? :except
426 @object_list[:items_available] = @objects.
427 except(:limit).except(:offset).
428 count(:id, distinct: true)
430 render json: @object_list
434 # Caveat: this is highly dependent on the proxy setup. YMMV.
435 if request.headers.has_key?('HTTP_X_REAL_IP') then
436 # We're behind a reverse proxy
437 @remote_ip = request.headers['HTTP_X_REAL_IP']
439 # Hopefully, we are not!
440 @remote_ip = request.env['REMOTE_ADDR']
444 def self._index_requires_parameters
446 filters: { type: 'array', required: false },
447 where: { type: 'object', required: false },
448 order: { type: 'array', required: false },
449 select: { type: 'array', required: false },
450 distinct: { type: 'boolean', required: false },
451 limit: { type: 'integer', required: false, default: DEFAULT_LIMIT },
452 offset: { type: 'integer', required: false, default: 0 },
456 def client_accepts_plain_text_stream
457 (request.headers['Accept'].split(' ') &
458 ['text/plain', '*/*']).count > 0
463 response = opts.first[:json]
464 if response.is_a?(Hash) &&
466 Thread.current[:request_starttime]
467 response[:_profile] = {
468 request_time: Time.now - Thread.current[:request_starttime]
476 return Rails.configuration.arvados_theme