1 # Copyright (C) The Arvados Authors. All rights reserved.
3 # SPDX-License-Identifier: AGPL-3.0
5 class Arvados::V1::UsersController < ApplicationController
6 accept_attribute_as_json :prefs, Hash
7 accept_param_as_json :updates
9 skip_before_action :find_object_by_uuid, only:
10 [:activate, :current, :system, :setup, :merge, :batch_update]
11 skip_before_action :render_404_if_no_object, only:
12 [:activate, :current, :system, :setup, :merge, :batch_update]
13 before_action :admin_required, only: [:setup, :unsetup, :update_uuid, :batch_update]
15 # Internal API used by controller to update local cache of user
16 # records from LoginCluster.
19 params[:updates].andand.each do |uuid, attrs|
21 u = User.find_or_create_by(uuid: uuid)
22 rescue ActiveRecord::RecordNotUnique
25 u.update_attributes!(nullify_attrs(attrs))
35 @object = current_user
38 send_error("Not logged in", status: 401)
48 if params[:id] and params[:id].match(/\D/)
49 params[:uuid] = params.delete :id
51 if current_user.andand.is_admin && params[:uuid]
52 @object = User.find_by_uuid params[:uuid]
54 @object = current_user
56 if not @object.is_active
57 if not (current_user.is_admin or @object.is_invited)
58 logger.warn "User #{@object.uuid} called users.activate " +
60 raise ArgumentError.new "Cannot activate without being invited."
63 required_uuids = Link.where("owner_uuid = ? and link_class = ? and name = ? and tail_uuid = ? and head_uuid like ?",
68 Collection.uuid_like_pattern).
70 signed_uuids = Link.where(owner_uuid: system_user_uuid,
71 link_class: 'signature',
73 tail_uuid: @object.uuid,
74 head_uuid: required_uuids).
76 todo_uuids = required_uuids - signed_uuids
78 @object.update_attributes is_active: true
79 logger.info "User #{@object.uuid} activated"
81 logger.warn "User #{@object.uuid} called users.activate " +
82 "before signing agreements #{todo_uuids.inspect}"
83 raise ArvadosModel::PermissionDeniedError.new \
84 "Cannot activate without user agreements #{todo_uuids.inspect}."
91 # create user object and all the needed links
94 @object = User.find_by_uuid(params[:uuid])
96 return render_404_if_no_object
98 elsif !params[:user] || params[:user].empty?
99 raise ArgumentError.new "Required uuid or user"
100 elsif !params[:user]['email']
101 raise ArgumentError.new "Require user email"
103 @object = model_class.create! resource_attrs
106 # It's not always possible for the client to know the user's
107 # username when submitting this request: the username might have
108 # been assigned automatically in create!() above. If client
109 # provided a plain repository name, prefix it with the username
110 # now that we know what it is.
111 if params[:repo_name].nil?
113 elsif @object.username.nil?
115 new("cannot setup a repository because user has no username")
116 elsif params[:repo_name].index("/")
117 full_repo_name = params[:repo_name]
119 full_repo_name = "#{@object.username}/#{params[:repo_name]}"
122 @response = @object.setup(repo_name: full_repo_name,
123 vm_uuid: params[:vm_uuid])
125 # setup succeeded. send email to user
126 if params[:send_notification_email]
128 UserNotifier.account_is_setup(@object).deliver_now
130 logger.warn "Failed to send email to #{@object.email}: #{e}"
134 send_json kind: "arvados#HashList", items: @response.as_api_response(nil)
137 # delete user agreements, vm, repository, login links; set state to inactive
139 reload_object_before_update
144 # Change UUID to a new (unused) uuid and transfer all owned/linked
145 # objects accordingly.
147 @object.update_uuid(new_uuid: params[:new_uuid])
152 if (params[:old_user_uuid] || params[:new_user_uuid])
153 if !current_user.andand.is_admin
154 return send_error("Must be admin to use old_user_uuid/new_user_uuid", status: 403)
156 if !params[:old_user_uuid] || !params[:new_user_uuid]
157 return send_error("Must supply both old_user_uuid and new_user_uuid", status: 422)
159 new_user = User.find_by_uuid(params[:new_user_uuid])
161 return send_error("User in new_user_uuid not found", status: 422)
163 @object = User.find_by_uuid(params[:old_user_uuid])
165 return send_error("User in old_user_uuid not found", status: 422)
168 if !Thread.current[:api_client].andand.is_trusted
169 return send_error("supplied API token is not from a trusted client", status: 403)
170 elsif Thread.current[:api_client_authorization].scopes != ['all']
171 return send_error("cannot merge with a scoped token", status: 403)
174 new_auth = ApiClientAuthorization.validate(token: params[:new_user_token])
176 return send_error("invalid new_user_token", status: 401)
179 if new_auth.user.uuid[0..4] == Rails.configuration.ClusterID
180 if !new_auth.api_client.andand.is_trusted
181 return send_error("supplied new_user_token is not from a trusted client", status: 403)
182 elsif new_auth.scopes != ['all']
183 return send_error("supplied new_user_token has restricted scope", status: 403)
186 new_user = new_auth.user
187 @object = current_user
190 if @object.uuid == new_user.uuid
191 return send_error("cannot merge user to self", status: 422)
194 if !params[:new_owner_uuid]
195 return send_error("missing new_owner_uuid", status: 422)
198 if !new_user.can?(write: params[:new_owner_uuid])
199 return send_error("cannot move objects into supplied new_owner_uuid: new user does not have write permission", status: 403)
202 act_as_system_user do
203 @object.merge(new_owner_uuid: params[:new_owner_uuid],
204 new_user_uuid: new_user.uuid,
205 redirect_to_new_user: params[:redirect_to_new_user])
212 def self._merge_requires_parameters
215 type: 'string', required: true,
218 type: 'string', required: false,
220 redirect_to_new_user: {
221 type: 'boolean', required: false,
224 type: 'string', required: false,
227 type: 'string', required: false,
232 def self._setup_requires_parameters
235 type: 'string', required: false
238 type: 'object', required: false
241 type: 'string', required: false
244 type: 'string', required: false
246 send_notification_email: {
247 type: 'boolean', required: false, default: false
252 def self._update_uuid_requires_parameters
255 type: 'string', required: true,
260 def apply_filters(model_class=nil)
261 return super if @read_users.any?(&:is_admin)
262 if params[:uuid] != current_user.andand.uuid
263 # Non-admin index/show returns very basic information about readable users.
264 safe_attrs = ["uuid", "is_active", "email", "first_name", "last_name", "username"]
266 @select = @select & safe_attrs
270 @filters += [['is_active', '=', true]]
275 def nullable_attributes
276 super + [:email, :first_name, :last_name, :username]