5824: Update/clarify docs and comments.
[arvados.git] / apps / workbench / app / controllers / collections_controller.rb
1 require "arvados/keep"
2 require "uri"
3 require "cgi"
4
5 class CollectionsController < ApplicationController
6   include ActionController::Live
7
8   skip_around_filter :require_thread_api_token, if: proc { |ctrl|
9     Rails.configuration.anonymous_user_token and
10     'show' == ctrl.action_name
11   }
12   skip_around_filter(:require_thread_api_token,
13                      only: [:show_file, :show_file_links])
14   skip_before_filter(:find_object_by_uuid,
15                      only: [:provenance, :show_file, :show_file_links])
16   # We depend on show_file to display the user agreement:
17   skip_before_filter :check_user_agreements, only: :show_file
18   skip_before_filter :check_user_profile, only: :show_file
19
20   RELATION_LIMIT = 5
21
22   def show_pane_list
23     panes = %w(Files Upload Provenance_graph Used_by Advanced)
24     panes = panes - %w(Upload) unless (@object.editable? rescue false)
25     panes
26   end
27
28   def set_persistent
29     case params[:value]
30     when 'persistent', 'cache'
31       persist_links = Link.filter([['owner_uuid', '=', current_user.uuid],
32                                    ['link_class', '=', 'resources'],
33                                    ['name', '=', 'wants'],
34                                    ['tail_uuid', '=', current_user.uuid],
35                                    ['head_uuid', '=', @object.uuid]])
36       logger.debug persist_links.inspect
37     else
38       return unprocessable "Invalid value #{value.inspect}"
39     end
40     if params[:value] == 'persistent'
41       if not persist_links.any?
42         Link.create(link_class: 'resources',
43                     name: 'wants',
44                     tail_uuid: current_user.uuid,
45                     head_uuid: @object.uuid)
46       end
47     else
48       persist_links.each do |link|
49         link.destroy || raise
50       end
51     end
52
53     respond_to do |f|
54       f.json { render json: @object }
55     end
56   end
57
58   def index
59     # API server index doesn't return manifest_text by default, but our
60     # callers want it unless otherwise specified.
61     @select ||= Collection.columns.map(&:name)
62     base_search = Collection.select(@select)
63     if params[:search].andand.length.andand > 0
64       tags = Link.where(any: ['contains', params[:search]])
65       @objects = (base_search.where(uuid: tags.collect(&:head_uuid)) |
66                       base_search.where(any: ['contains', params[:search]])).
67         uniq { |c| c.uuid }
68     else
69       if params[:limit]
70         limit = params[:limit].to_i
71       else
72         limit = 100
73       end
74
75       if params[:offset]
76         offset = params[:offset].to_i
77       else
78         offset = 0
79       end
80
81       @objects = base_search.limit(limit).offset(offset)
82     end
83     @links = Link.where(head_uuid: @objects.collect(&:uuid))
84     @collection_info = {}
85     @objects.each do |c|
86       @collection_info[c.uuid] = {
87         tag_links: [],
88         wanted: false,
89         wanted_by_me: false,
90         provenance: [],
91         links: []
92       }
93     end
94     @links.each do |link|
95       @collection_info[link.head_uuid] ||= {}
96       info = @collection_info[link.head_uuid]
97       case link.link_class
98       when 'tag'
99         info[:tag_links] << link
100       when 'resources'
101         info[:wanted] = true
102         info[:wanted_by_me] ||= link.tail_uuid == current_user.uuid
103       when 'provenance'
104         info[:provenance] << link.name
105       end
106       info[:links] << link
107     end
108     @request_url = request.url
109
110     render_index
111   end
112
113   def show_file_links
114     Thread.current[:reader_tokens] = [params[:reader_token]]
115     return if false.equal?(find_object_by_uuid)
116     render layout: false
117   end
118
119   def show_file
120     # We pipe from arv-get to send the file to the user.  Before we start it,
121     # we ask the API server if the file actually exists.  This serves two
122     # purposes: it lets us return a useful status code for common errors, and
123     # helps us figure out which token to provide to arv-get.
124     # The order of searched tokens is important: because the anonymous user
125     # token is passed along with every API request, we have to check it first.
126     # Otherwise, it's impossible to know whether any other request succeeded
127     # because of the reader token.
128     coll = nil
129     tokens = [(Rails.configuration.anonymous_user_token || nil),
130               params[:reader_token],
131               Thread.current[:arvados_api_token]].compact
132     usable_token = find_usable_token(tokens) do
133       coll = Collection.find(params[:uuid])
134     end
135     if usable_token.nil?
136       # Response already rendered.
137       return
138     end
139
140     # If we are configured to use a keep-web server, just redirect to
141     # the appropriate URL.
142     if Rails.configuration.keep_web_url or
143         Rails.configuration.keep_web_download_url
144       opts = {}
145       if usable_token == params[:reader_token]
146         opts[:path_token] = usable_token
147       elsif usable_token == Rails.configuration.anonymous_user_token
148         # Don't pass a token at all
149       else
150         # We pass the current user's real token only if it's necessary
151         # to read the collection.
152         opts[:query_token] = usable_token
153       end
154       opts[:disposition] = params[:disposition] if params[:disposition]
155       return redirect_to keep_web_url(params[:uuid], params[:file], opts)
156     end
157
158     # No keep-web server available. Get the file data with arv-get,
159     # and serve it through Rails.
160
161     file_name = params[:file].andand.sub(/^(\.\/|\/|)/, './')
162     if file_name.nil? or not coll.manifest.has_file?(file_name)
163       return render_not_found
164     end
165
166     opts = params.merge(arvados_api_token: usable_token)
167
168     # Handle Range requests. Currently we support only 'bytes=0-....'
169     if request.headers.include? 'HTTP_RANGE'
170       if m = /^bytes=0-(\d+)/.match(request.headers['HTTP_RANGE'])
171         opts[:maxbytes] = m[1]
172         size = params[:size] || '*'
173         self.response.status = 206
174         self.response.headers['Content-Range'] = "bytes 0-#{m[1]}/#{size}"
175       end
176     end
177
178     ext = File.extname(params[:file])
179     self.response.headers['Content-Type'] =
180       Rack::Mime::MIME_TYPES[ext] || 'application/octet-stream'
181     if params[:size]
182       size = params[:size].to_i
183       if opts[:maxbytes]
184         size = [size, opts[:maxbytes].to_i].min
185       end
186       self.response.headers['Content-Length'] = size.to_s
187     end
188     self.response.headers['Content-Disposition'] = params[:disposition] if params[:disposition]
189     begin
190       file_enumerator(opts).each do |bytes|
191         response.stream.write bytes
192       end
193     ensure
194       response.stream.close
195     end
196   end
197
198   def sharing_scopes
199     ["GET /arvados/v1/collections/#{@object.uuid}", "GET /arvados/v1/collections/#{@object.uuid}/", "GET /arvados/v1/keep_services/accessible"]
200   end
201
202   def search_scopes
203     begin
204       ApiClientAuthorization.filter([['scopes', '=', sharing_scopes]]).results
205     rescue ArvadosApiClient::AccessForbiddenException
206       nil
207     end
208   end
209
210   def find_object_by_uuid
211     if not Keep::Locator.parse params[:id]
212       super
213     end
214   end
215
216   def show
217     return super if !@object
218
219     @logs = []
220
221     if params["tab_pane"] == "Provenance_graph"
222       @prov_svg = ProvenanceHelper::create_provenance_graph(@object.provenance, "provenance_svg",
223                                                             {:request => request,
224                                                              :direction => :bottom_up,
225                                                              :combine_jobs => :script_only}) rescue nil
226     end
227
228     if current_user
229       if Keep::Locator.parse params["uuid"]
230         @same_pdh = Collection.filter([["portable_data_hash", "=", @object.portable_data_hash]]).limit(20)
231         if @same_pdh.results.size == 1
232           redirect_to collection_path(@same_pdh[0]["uuid"])
233           return
234         end
235         owners = @same_pdh.map(&:owner_uuid).to_a.uniq
236         preload_objects_for_dataclass Group, owners
237         preload_objects_for_dataclass User, owners
238         uuids = @same_pdh.map(&:uuid).to_a.uniq
239         preload_links_for_objects uuids
240         render 'hash_matches'
241         return
242       else
243         jobs_with = lambda do |conds|
244           Job.limit(RELATION_LIMIT).where(conds)
245             .results.sort_by { |j| j.finished_at || j.created_at }
246         end
247         @output_of = jobs_with.call(output: @object.portable_data_hash)
248         @log_of = jobs_with.call(log: @object.portable_data_hash)
249         @project_links = Link.limit(RELATION_LIMIT).order("modified_at DESC")
250           .where(head_uuid: @object.uuid, link_class: 'name').results
251         project_hash = Group.where(uuid: @project_links.map(&:tail_uuid)).to_hash
252         @projects = project_hash.values
253
254         @permissions = Link.limit(RELATION_LIMIT).order("modified_at DESC")
255           .where(head_uuid: @object.uuid, link_class: 'permission',
256                  name: 'can_read').results
257         @logs = Log.limit(RELATION_LIMIT).order("created_at DESC")
258           .select(%w(uuid event_type object_uuid event_at summary))
259           .where(object_uuid: @object.uuid).results
260         @is_persistent = Link.limit(1)
261           .where(head_uuid: @object.uuid, tail_uuid: current_user.uuid,
262                  link_class: 'resources', name: 'wants')
263           .results.any?
264         @search_sharing = search_scopes
265
266         if params["tab_pane"] == "Used_by"
267           @used_by_svg = ProvenanceHelper::create_provenance_graph(@object.used_by, "used_by_svg",
268                                                                    {:request => request,
269                                                                      :direction => :top_down,
270                                                                      :combine_jobs => :script_only,
271                                                                      :pdata_only => true}) rescue nil
272         end
273       end
274     end
275     super
276   end
277
278   def sharing_popup
279     @search_sharing = search_scopes
280     render("sharing_popup.js", content_type: "text/javascript")
281   end
282
283   helper_method :download_link
284
285   def download_link
286     collections_url + "/download/#{@object.uuid}/#{@search_sharing.first.api_token}/"
287   end
288
289   def share
290     ApiClientAuthorization.create(scopes: sharing_scopes)
291     sharing_popup
292   end
293
294   def unshare
295     search_scopes.each do |s|
296       s.destroy
297     end
298     sharing_popup
299   end
300
301   protected
302
303   def find_usable_token(token_list)
304     # Iterate over every given token to make it the current token and
305     # yield the given block.
306     # If the block succeeds, return the token it used.
307     # Otherwise, render an error response based on the most specific
308     # error we encounter, and return nil.
309     most_specific_error = [401]
310     token_list.each do |api_token|
311       begin
312         # We can't load the corresponding user, because the token may not
313         # be scoped for that.
314         using_specific_api_token(api_token, load_user: false) do
315           yield
316           return api_token
317         end
318       rescue ArvadosApiClient::ApiError => error
319         if error.api_status >= most_specific_error.first
320           most_specific_error = [error.api_status, error]
321         end
322       end
323     end
324     case most_specific_error.shift
325     when 401, 403
326       redirect_to_login
327     when 404
328       render_not_found(*most_specific_error)
329     end
330     return nil
331   end
332
333   def keep_web_url(uuid_or_pdh, file, opts)
334     munged_id = uuid_or_pdh.sub('+', '-')
335     fmt = {uuid_or_pdh: munged_id}
336
337     tmpl = Rails.configuration.keep_web_url
338     if Rails.configuration.keep_web_download_url and
339         (!tmpl or opts[:disposition] == 'attachment')
340       # Prefer the attachment-only-host when we want an attachment
341       # (and when there is no preview link configured)
342       tmpl = Rails.configuration.keep_web_download_url
343     else
344       check_uri = URI.parse(tmpl % fmt)
345       if opts[:query_token] and
346           not check_uri.host.start_with?(munged_id + "--") and
347           not check_uri.host.start_with?(munged_id + ".")
348         # We're about to pass a token in the query string, but
349         # keep-web can't accept that safely at a single-origin URL
350         # template (unless it's -attachment-only-host).
351         tmpl = Rails.configuration.keep_web_download_url
352         if not tmpl
353           raise ArgumentError, "Download precluded by site configuration"
354         end
355         logger.warn("Using download link, even though inline content " \
356                     "was requested: #{check_uri.to_s}")
357       end
358     end
359
360     if tmpl == Rails.configuration.keep_web_download_url
361       # This takes us to keep-web's -attachment-only-host so there is
362       # no need to add ?disposition=attachment.
363       opts.delete :disposition
364     end
365
366     uri = URI.parse(tmpl % fmt)
367     uri.path += '/' unless uri.path.end_with? '/'
368     if opts[:path_token]
369       uri.path += 't=' + opts[:path_token] + '/'
370     end
371     uri.path += '_/'
372     uri.path += CGI::escape(file)
373
374     query = CGI::parse(uri.query || '')
375     { query_token: 'api_token',
376       disposition: 'disposition' }.each do |opt, param|
377       if opts.include? opt
378         query[param] = opts[opt]
379       end
380     end
381     unless query.empty?
382       uri.query = query.to_query
383     end
384
385     uri.to_s
386   end
387
388   # Note: several controller and integration tests rely on stubbing
389   # file_enumerator to return fake file content.
390   def file_enumerator opts
391     FileStreamer.new opts
392   end
393
394   class FileStreamer
395     include ArvadosApiClientHelper
396     def initialize(opts={})
397       @opts = opts
398     end
399     def each
400       return unless @opts[:uuid] && @opts[:file]
401
402       env = Hash[ENV].dup
403
404       require 'uri'
405       u = URI.parse(arvados_api_client.arvados_v1_base)
406       env['ARVADOS_API_HOST'] = "#{u.host}:#{u.port}"
407       env['ARVADOS_API_TOKEN'] = @opts[:arvados_api_token]
408       env['ARVADOS_API_HOST_INSECURE'] = "true" if Rails.configuration.arvados_insecure_https
409
410       bytesleft = @opts[:maxbytes].andand.to_i || 2**16
411       io = IO.popen([env, 'arv-get', "#{@opts[:uuid]}/#{@opts[:file]}"], 'rb')
412       while bytesleft > 0 && (buf = io.read([bytesleft, 2**16].min)) != nil
413         # shrink the bytesleft count, if we were given a maximum byte
414         # count to read
415         if @opts.include? :maxbytes
416           bytesleft = bytesleft - buf.length
417         end
418         yield buf
419       end
420       io.close
421       # "If ios is opened by IO.popen, close sets $?."
422       # http://www.ruby-doc.org/core-2.1.3/IO.html#method-i-close
423       Rails.logger.warn("#{@opts[:uuid]}/#{@opts[:file]}: #{$?}") if $? != 0
424     end
425   end
426 end