1 class UsersController < ApplicationController
2 skip_around_filter :require_thread_api_token, only: :welcome
3 skip_before_filter :check_user_agreements, only: [:welcome, :inactive]
4 skip_before_filter :check_user_profile, only: [:welcome, :inactive, :profile]
5 skip_before_filter :find_object_by_uuid, only: [:welcome, :activity, :storage]
6 before_filter :ensure_current_user_is_admin, only: [:sudo, :unsetup, :setup]
10 redirect_to (params[:return_to] || '/')
15 if current_user.andand.is_invited
16 redirect_to (params[:return_to] || '/')
21 params[:offer_return_to] ||= params[:return_to]
25 @breadcrumb_page_name = nil
26 @users = User.limit(params[:limit] || 1000).all
31 pipeline_instances: {}
34 @spans = [['This week', Time.now.beginning_of_week, Time.now],
36 Time.now.beginning_of_week.advance(weeks:-1),
37 Time.now.beginning_of_week],
38 ['This month', Time.now.beginning_of_month, Time.now],
40 1.month.ago.beginning_of_month,
41 Time.now.beginning_of_month]]
42 @spans.each do |span, threshold_start, threshold_end|
43 @activity[:logins][span] = Log.
44 filter([[:event_type, '=', 'login'],
45 [:object_kind, '=', 'arvados#user'],
46 [:created_at, '>=', threshold_start],
47 [:created_at, '<', threshold_end]])
48 @activity[:jobs][span] = Job.
49 filter([[:created_at, '>=', threshold_start],
50 [:created_at, '<', threshold_end]])
51 @activity[:pipeline_instances][span] = PipelineInstance.
52 filter([[:created_at, '>=', threshold_start],
53 [:created_at, '<', threshold_end]])
54 @activity.each do |type, act|
57 @user_activity[u.uuid] ||= {}
58 @user_activity[u.uuid][span + ' ' + type.to_s] ||= 0
60 records.each do |record|
61 @user_activity[record.modified_by_user_uuid] ||= {}
62 @user_activity[record.modified_by_user_uuid][span + ' ' + type.to_s] ||= 0
63 @user_activity[record.modified_by_user_uuid][span + ' ' + type.to_s] += 1
64 @total_activity[span + ' ' + type.to_s] ||= 0
65 @total_activity[span + ' ' + type.to_s] += 1
69 @users = @users.sort_by do |a|
70 [-@user_activity[a.uuid].values.inject(:+), a.full_name]
72 # Prepend a "Total" pseudo-user to the sorted list
73 @user_activity[nil] = @total_activity
74 @users = [OpenStruct.new(uuid: nil)] + @users
78 @breadcrumb_page_name = nil
79 @users = User.limit(params[:limit] || 1000).all
84 @user_storage[u.uuid] ||= {}
86 filter([[:object_uuid, '=', u.uuid],
87 [:event_type, '=', 'user-storage-report']]).
88 order(:created_at => :desc).
90 storage_log.each do |log_entry|
91 # We expect this block to only execute once since we specified limit(1)
92 @user_storage[u.uuid] = log_entry['properties']
93 @log_date[u.uuid] = log_entry['event_at']
95 total_storage.merge!(@user_storage[u.uuid]) { |k,v1,v2| v1 + v2 }
97 @users = @users.sort_by { |u|
98 [-@user_storage[u.uuid].values.push(0).inject(:+), u.full_name]}
99 # Prepend a "Total" pseudo-user to the sorted list
100 @users = [OpenStruct.new(uuid: nil)] + @users
101 @user_storage[nil] = total_storage
105 if current_user.andand.is_admin
113 if current_user.andand.is_admin
121 resp = arvados_api_client.api(ApiClientAuthorization, '', {
122 api_client_authorization: {
123 owner_uuid: @object.uuid
126 redirect_to root_url(api_token: resp[:api_token])
130 @showallalerts = false
131 @my_ssh_keys = AuthorizedKey.where(authorized_user_uuid: current_user.uuid)
136 order('created_at desc').
137 where(created_by: current_user.uuid)
139 @my_collections = Collection.
141 order('created_at desc').
142 where(created_by: current_user.uuid)
143 collection_uuids = @my_collections.collect &:uuid
146 collection_uuids.each do |uuid|
147 @persist_state[uuid] = 'cache'
150 Link.limit(1000).filter([['head_uuid', 'in', collection_uuids],
151 ['link_class', 'in', ['tag', 'resources']]]).
155 (@my_tag_links[link.head_uuid] ||= []) << link
157 if link.name == 'wants'
158 @persist_state[link.head_uuid] = 'persistent'
163 @my_pipelines = PipelineInstance.
165 order('created_at desc').
166 where(created_by: current_user.uuid)
169 f.js { render template: 'users/home.js' }
170 f.html { render template: 'users/home' }
175 if current_user.andand.is_admin
182 respond_to do |format|
183 if current_user.andand.is_admin
185 setup_params[:send_notification_email] = "#{Rails.configuration.send_user_setup_notification_email}"
186 if params['user_uuid'] && params['user_uuid'].size>0
187 setup_params[:uuid] = params['user_uuid']
189 if params['email'] && params['email'].size>0
190 user = {email: params['email']}
191 setup_params[:user] = user
193 if params['openid_prefix'] && params['openid_prefix'].size>0
194 setup_params[:openid_prefix] = params['openid_prefix']
196 if params['repo_name'] && params['repo_name'].size>0
197 setup_params[:repo_name] = params['repo_name']
199 if params['vm_uuid'] && params['vm_uuid'].size>0
200 setup_params[:vm_uuid] = params['vm_uuid']
203 if User.setup setup_params
206 self.render_error status: 422
209 self.render_error status: 422
215 @vms = VirtualMachine.all.results
217 @current_selections = find_current_links @object
219 respond_to do |format|
226 # repositories current user can read / write
228 Link.filter([['head_uuid', 'is_a', 'arvados#repository'],
229 ['tail_uuid', '=', current_user.uuid],
230 ['link_class', '=', 'permission'],
231 ['name', 'in', ['can_write', 'can_read']],
234 repo_links << perm_link[:head_uuid]
236 @my_repositories = Repository.where(uuid: repo_links)
238 # virtual machines the current user can login into
240 Link.where(tail_uuid: current_user.uuid,
241 link_class: 'permission',
244 if perm_link.properties.andand[:username]
245 @my_vm_logins[perm_link.head_uuid] ||= []
246 @my_vm_logins[perm_link.head_uuid] << perm_link.properties[:username]
249 @my_virtual_machines = VirtualMachine.where(uuid: @my_vm_logins.keys)
251 # current user's ssh keys
252 @my_ssh_keys = AuthorizedKey.where(key_type: 'SSH', owner_uuid: current_user.uuid)
255 f.html { render template: 'users/manage_account' }
259 def add_ssh_key_popup
260 respond_to do |format|
267 respond_to do |format|
268 key_params = {'key_type' => 'SSH'}
269 key_params['authorized_user_uuid'] = current_user.uuid
271 if params['name'] && params['name'].size>0
272 key_params['name'] = params['name'].strip
274 if params['public_key'] && params['public_key'].size>0
275 key_params['public_key'] = params['public_key'].strip
278 if !key_params['name'] && params['public_key'].andand.size>0
279 split_key = key_params['public_key'].split
280 key_params['name'] = split_key[-1] if (split_key.size == 3)
283 new_key = AuthorizedKey.create! key_params
287 self.render_error status: 422
294 def find_current_links user
295 current_selections = {}
298 return current_selections
302 oid_login_perms = Link.where(tail_uuid: user.email,
303 head_kind: 'arvados#user',
304 link_class: 'permission',
307 if oid_login_perms.any?
308 prefix_properties = oid_login_perms.first.properties
309 current_selections[:identity_url_prefix] = prefix_properties[:identity_url_prefix]
313 repo_perms = Link.where(tail_uuid: user.uuid,
314 head_kind: 'arvados#repository',
315 link_class: 'permission',
318 repo_uuid = repo_perms.first.head_uuid
319 repos = Repository.where(head_uuid: repo_uuid)
321 repo_name = repos.first.name
322 current_selections[:repo_name] = repo_name
327 vm_login_perms = Link.where(tail_uuid: user.uuid,
328 head_kind: 'arvados#virtualMachine',
329 link_class: 'permission',
331 if vm_login_perms.any?
332 vm_uuid = vm_login_perms.first.head_uuid
333 current_selections[:vm_uuid] = vm_uuid
336 return current_selections