1 class ApplicationController < ActionController::Base
2 include CurrentApiClient
5 before_filter :uncamelcase_params_hash_keys
6 around_filter :thread_with_auth_info, :except => [:render_error, :render_not_found]
8 before_filter :remote_ip
9 before_filter :login_required, :except => :render_not_found
10 before_filter :catch_redirect_hint
12 before_filter :load_where_param, :only => :index
13 before_filter :find_objects_for_index, :only => :index
14 before_filter :find_object_by_uuid, :except => [:index, :create]
16 attr_accessor :resource_attrs
20 if params[:eager] and params[:eager] != '0' and params[:eager] != 0 and params[:eager] != ''
21 @objects.each(&:eager_load_associations)
28 render json: @object.as_api_response(:superuser)
30 render_not_found("object not found")
35 @object = model_class.new resource_attrs
41 attrs_to_update = resource_attrs.reject { |k,v| [:kind,:etag].index k }
42 if @object.update_attributes attrs_to_update
45 render json: { errors: @object.errors.full_messages }, status: 422
54 def catch_redirect_hint
56 if params.has_key?('redirect_to') then
57 session[:redirect_to] = params[:redirect_to]
63 rescue_from Exception,
64 :with => :render_error
65 rescue_from ActiveRecord::RecordNotFound,
66 :with => :render_not_found
67 rescue_from ActionController::RoutingError,
68 :with => :render_not_found
69 rescue_from ActionController::UnknownController,
70 :with => :render_not_found
71 rescue_from ActionController::UnknownAction,
72 :with => :render_not_found
73 rescue_from ArvadosModel::PermissionDeniedError,
74 :with => :render_error
78 logger.error e.inspect
79 logger.error e.backtrace.collect { |x| x + "\n" }.join('') if e.backtrace
80 if @object and @object.errors and @object.errors.full_messages and not @object.errors.full_messages.empty?
81 errors = @object.errors.full_messages
85 render json: { errors: errors }, status: 422
88 def render_not_found(e=ActionController::RoutingError.new("Path not found"))
89 logger.error e.inspect
90 render json: { errors: ["Path not found"] }, status: 404
96 @where = params[:where] || {}
97 @where = Oj.load(@where) if @where.is_a?(String)
100 def find_objects_for_index
101 uuid_list = [current_user.uuid, *current_user.groups_i_can(:read)]
102 sanitized_uuid_list = uuid_list.
103 collect { |uuid| model_class.sanitize(uuid) }.join(', ')
104 or_references_me = ''
105 if model_class == Link and current_user
106 or_references_me = "OR #{model_class.sanitize current_user.uuid} IN (#{table_name}.head_uuid, #{table_name}.tail_uuid)"
108 @objects ||= model_class.
109 joins("LEFT JOIN links permissions ON permissions.head_uuid in (#{table_name}.owner, #{table_name}.uuid) AND permissions.tail_uuid in (#{sanitized_uuid_list}) AND permissions.link_class='permission'").
110 where("?=? OR #{table_name}.owner in (?) OR #{table_name}.uuid=? OR permissions.head_uuid IS NOT NULL #{or_references_me}",
111 true, current_user.is_admin,
116 @where.each do |attr,value|
117 if attr == 'any' or attr == :any
118 if value.is_a?(Array) and
119 value[0] == 'contains' and
120 model_class.columns.collect(&:name).index('name') then
121 conditions[0] << " and #{table_name}.name ilike ?"
122 conditions << "%#{value[1]}%"
124 elsif attr.to_s.match(/^[a-z][_a-z0-9]+$/) and
125 model_class.columns.collect(&:name).index(attr.to_s)
127 conditions[0] << " and #{table_name}.#{attr} is ?"
129 elsif value.is_a? Array
130 conditions[0] << " and #{table_name}.#{attr} in (?)"
132 elsif value.is_a? String or value.is_a? Fixnum or value == true or value == false
133 conditions[0] << " and #{table_name}.#{attr}=?"
135 elsif value.is_a? Hash
136 # Not quite the same thing as "equal?" but better than nothing?
139 conditions[0] << " and #{table_name}.#{attr} ilike ?"
140 conditions << "%#{k}%#{v}%"
146 if conditions.length > 1
147 conditions[0].sub!(/^1=1 and /, '')
154 @objects = @objects.limit(params[:limit].to_i)
156 raise ArgumentError.new("Invalid value for limit parameter")
159 @objects = @objects.limit(100)
163 params[:order].split(',').each do |order|
164 attr, direction = order.strip.split " "
166 if attr.match /^[a-z][_a-z0-9]+$/ and
167 model_class.columns.collect(&:name).index(attr) and
168 ['asc','desc'].index direction.downcase
169 orders << "#{table_name}.#{attr} #{direction.downcase}"
174 orders << "#{table_name}.modified_at desc"
176 @objects = @objects.order(orders.join ", ")
180 return @attrs if @attrs
181 @attrs = params[resource_name]
182 if @attrs.is_a? String
183 @attrs = uncamelcase_hash_keys(Oj.load @attrs)
185 unless @attrs.is_a? Hash
186 message = "No #{resource_name}"
187 if resource_name.index('_')
188 message << " (or #{resource_name.camelcase(:lower)})"
190 message << " hash provided with request"
191 raise ArgumentError.new(message)
193 %w(created_at modified_by_client modified_by_user modified_at).each do |x|
202 respond_to do |format|
204 redirect_to '/auth/joshid'
207 render :json => { errors: ['Not logged in'] }.to_json
214 unless current_user and current_user.is_admin
215 render :json => { errors: ['Forbidden'] }.to_json, status: 403
219 def thread_with_auth_info
223 api_client_auth = nil
225 params[:api_token] ||
226 params[:oauth_token] ||
227 request.headers["Authorization"].andand.match(/OAuth2 ([a-z0-9]+)/).andand[1]
229 api_client_auth = ApiClientAuthorization.
230 includes(:api_client, :user).
231 where('api_token=?', supplied_token).
234 session[:user_id] = api_client_auth.user.id
235 session[:api_client_uuid] = api_client_auth.api_client.uuid
236 session[:api_client_authorization_id] = api_client_auth.id
237 user = api_client_auth.user
238 api_client = api_client_auth.api_client
240 elsif session[:user_id]
241 user = User.find(session[:user_id]) rescue nil
242 api_client = ApiClient.
243 where('uuid=?',session[:api_client_uuid]).
245 if session[:api_client_authorization_id] then
246 api_client_auth = ApiClientAuthorization.
247 find session[:api_client_authorization_id]
250 Thread.current[:api_client_trusted] = session[:api_client_trusted]
251 Thread.current[:api_client_ip_address] = remote_ip
252 Thread.current[:api_client_authorization] = api_client_auth
253 Thread.current[:api_client_uuid] = api_client && api_client.uuid
254 Thread.current[:api_client] = api_client
255 Thread.current[:user] = user
258 Thread.current[:api_client_trusted] = nil
259 Thread.current[:api_client_ip_address] = nil
260 Thread.current[:api_client_authorization] = nil
261 Thread.current[:api_client_uuid] = nil
262 Thread.current[:api_client] = nil
263 Thread.current[:user] = nil
269 controller_name.classify.constantize
272 def resource_name # params[] key used by client
273 controller_name.singularize
280 def find_object_by_uuid
281 if params[:id] and params[:id].match /\D/
282 params[:uuid] = params.delete :id
284 @object = model_class.where('uuid=?', params[:uuid]).first
287 def self.accept_attribute_as_json(attr, force_class=nil)
288 before_filter lambda { accept_attribute_as_json attr, force_class }
290 def accept_attribute_as_json(attr, force_class)
291 if params[resource_name].is_a? Hash
292 if params[resource_name][attr].is_a? String
293 params[resource_name][attr] = Oj.load params[resource_name][attr]
294 if force_class and !params[resource_name][attr].is_a? force_class
295 raise TypeError.new("#{resource_name}[#{attr.to_s}] must be a #{force_class.to_s}")
301 def uncamelcase_params_hash_keys
302 self.params = uncamelcase_hash_keys(params)
304 def uncamelcase_hash_keys(h, max_depth=-1)
305 if h.is_a? Hash and max_depth != 0
310 elsif k.class == Symbol
311 nk = k.to_s.underscore.to_sym
315 nh[nk] = uncamelcase_hash_keys(v, max_depth-1)
324 :kind => "arvados##{resource_name}List",
327 :next_page_token => "",
329 :items => @objects.as_api_response(:superuser)
331 render json: @object_list
335 # Caveat: this is highly dependent on the proxy setup. YMMV.
336 if request.headers.has_key?('HTTP_X_REAL_IP') then
337 # We're behind a reverse proxy
338 @remote_ip = request.headers['HTTP_X_REAL_IP']
340 # Hopefully, we are not!
341 @remote_ip = request.env['REMOTE_ADDR']
345 def self._index_requires_parameters
347 where: { type: 'object', required: false },
348 order: { type: 'string', required: false }