5 class CollectionsController < ApplicationController
6 include ActionController::Live
8 skip_around_filter :require_thread_api_token, if: proc { |ctrl|
9 Rails.configuration.anonymous_user_token and
10 'show' == ctrl.action_name
12 skip_around_filter(:require_thread_api_token,
13 only: [:show_file, :show_file_links])
14 skip_before_filter(:find_object_by_uuid,
15 only: [:provenance, :show_file, :show_file_links])
16 # We depend on show_file to display the user agreement:
17 skip_before_filter :check_user_agreements, only: :show_file
18 skip_before_filter :check_user_profile, only: :show_file
23 panes = %w(Files Upload Provenance_graph Used_by Advanced)
24 panes = panes - %w(Upload) unless (@object.editable? rescue false)
30 when 'persistent', 'cache'
31 persist_links = Link.filter([['owner_uuid', '=', current_user.uuid],
32 ['link_class', '=', 'resources'],
33 ['name', '=', 'wants'],
34 ['tail_uuid', '=', current_user.uuid],
35 ['head_uuid', '=', @object.uuid]])
36 logger.debug persist_links.inspect
38 return unprocessable "Invalid value #{value.inspect}"
40 if params[:value] == 'persistent'
41 if not persist_links.any?
42 Link.create(link_class: 'resources',
44 tail_uuid: current_user.uuid,
45 head_uuid: @object.uuid)
48 persist_links.each do |link|
54 f.json { render json: @object }
59 # API server index doesn't return manifest_text by default, but our
60 # callers want it unless otherwise specified.
61 @select ||= Collection.columns.map(&:name)
62 base_search = Collection.select(@select)
63 if params[:search].andand.length.andand > 0
64 tags = Link.where(any: ['contains', params[:search]])
65 @objects = (base_search.where(uuid: tags.collect(&:head_uuid)) |
66 base_search.where(any: ['contains', params[:search]])).
70 limit = params[:limit].to_i
76 offset = params[:offset].to_i
81 @objects = base_search.limit(limit).offset(offset)
83 @links = Link.where(head_uuid: @objects.collect(&:uuid))
86 @collection_info[c.uuid] = {
95 @collection_info[link.head_uuid] ||= {}
96 info = @collection_info[link.head_uuid]
99 info[:tag_links] << link
102 info[:wanted_by_me] ||= link.tail_uuid == current_user.uuid
104 info[:provenance] << link.name
108 @request_url = request.url
114 Thread.current[:reader_tokens] = [params[:reader_token]]
115 return if false.equal?(find_object_by_uuid)
120 # We pipe from arv-get to send the file to the user. Before we start it,
121 # we ask the API server if the file actually exists. This serves two
122 # purposes: it lets us return a useful status code for common errors, and
123 # helps us figure out which token to provide to arv-get.
124 # The order of searched tokens is important: because the anonymous user
125 # token is passed along with every API request, we have to check it first.
126 # Otherwise, it's impossible to know whether any other request succeeded
127 # because of the reader token.
129 tokens = [(Rails.configuration.anonymous_user_token || nil),
130 params[:reader_token],
131 Thread.current[:arvados_api_token]].compact
132 usable_token = find_usable_token(tokens) do
133 coll = Collection.find(params[:uuid])
136 # Response already rendered.
140 if Rails.configuration.keep_web_url
142 if usable_token == params[:reader_token]
143 opts[:path_token] = usable_token
144 elsif usable_token == Rails.configuration.anonymous_user_token
145 # Don't pass a token at all
147 # We pass the current user's real token only if it's necessary
148 # to read the collection.
149 opts[:query_token] = usable_token
151 opts[:disposition] = params[:disposition]
152 return redirect_to keep_web_url(params[:uuid], params[:file], opts)
155 file_name = params[:file].andand.sub(/^(\.\/|\/|)/, './')
156 if file_name.nil? or not coll.manifest.has_file?(file_name)
157 return render_not_found
160 opts = params.merge(arvados_api_token: usable_token)
162 # Handle Range requests. Currently we support only 'bytes=0-....'
163 if request.headers.include? 'HTTP_RANGE'
164 if m = /^bytes=0-(\d+)/.match(request.headers['HTTP_RANGE'])
165 opts[:maxbytes] = m[1]
166 size = params[:size] || '*'
167 self.response.status = 206
168 self.response.headers['Content-Range'] = "bytes 0-#{m[1]}/#{size}"
172 ext = File.extname(params[:file])
173 self.response.headers['Content-Type'] =
174 Rack::Mime::MIME_TYPES[ext] || 'application/octet-stream'
176 size = params[:size].to_i
178 size = [size, opts[:maxbytes].to_i].min
180 self.response.headers['Content-Length'] = size.to_s
182 self.response.headers['Content-Disposition'] = params[:disposition] if params[:disposition]
184 file_enumerator(opts).each do |bytes|
185 response.stream.write bytes
188 response.stream.close
193 ["GET /arvados/v1/collections/#{@object.uuid}", "GET /arvados/v1/collections/#{@object.uuid}/", "GET /arvados/v1/keep_services/accessible"]
198 ApiClientAuthorization.filter([['scopes', '=', sharing_scopes]]).results
199 rescue ArvadosApiClient::AccessForbiddenException
204 def find_object_by_uuid
205 if not Keep::Locator.parse params[:id]
211 return super if !@object
215 if params["tab_pane"] == "Provenance_graph"
216 @prov_svg = ProvenanceHelper::create_provenance_graph(@object.provenance, "provenance_svg",
217 {:request => request,
218 :direction => :bottom_up,
219 :combine_jobs => :script_only}) rescue nil
223 if Keep::Locator.parse params["uuid"]
224 @same_pdh = Collection.filter([["portable_data_hash", "=", @object.portable_data_hash]]).limit(20)
225 if @same_pdh.results.size == 1
226 redirect_to collection_path(@same_pdh[0]["uuid"])
229 owners = @same_pdh.map(&:owner_uuid).to_a.uniq
230 preload_objects_for_dataclass Group, owners
231 preload_objects_for_dataclass User, owners
232 uuids = @same_pdh.map(&:uuid).to_a.uniq
233 preload_links_for_objects uuids
234 render 'hash_matches'
237 jobs_with = lambda do |conds|
238 Job.limit(RELATION_LIMIT).where(conds)
239 .results.sort_by { |j| j.finished_at || j.created_at }
241 @output_of = jobs_with.call(output: @object.portable_data_hash)
242 @log_of = jobs_with.call(log: @object.portable_data_hash)
243 @project_links = Link.limit(RELATION_LIMIT).order("modified_at DESC")
244 .where(head_uuid: @object.uuid, link_class: 'name').results
245 project_hash = Group.where(uuid: @project_links.map(&:tail_uuid)).to_hash
246 @projects = project_hash.values
248 @permissions = Link.limit(RELATION_LIMIT).order("modified_at DESC")
249 .where(head_uuid: @object.uuid, link_class: 'permission',
250 name: 'can_read').results
251 @logs = Log.limit(RELATION_LIMIT).order("created_at DESC")
252 .select(%w(uuid event_type object_uuid event_at summary))
253 .where(object_uuid: @object.uuid).results
254 @is_persistent = Link.limit(1)
255 .where(head_uuid: @object.uuid, tail_uuid: current_user.uuid,
256 link_class: 'resources', name: 'wants')
258 @search_sharing = search_scopes
260 if params["tab_pane"] == "Used_by"
261 @used_by_svg = ProvenanceHelper::create_provenance_graph(@object.used_by, "used_by_svg",
262 {:request => request,
263 :direction => :top_down,
264 :combine_jobs => :script_only,
265 :pdata_only => true}) rescue nil
273 @search_sharing = search_scopes
274 render("sharing_popup.js", content_type: "text/javascript")
277 helper_method :download_link
280 collections_url + "/download/#{@object.uuid}/#{@search_sharing.first.api_token}/"
284 ApiClientAuthorization.create(scopes: sharing_scopes)
289 search_scopes.each do |s|
297 def find_usable_token(token_list)
298 # Iterate over every given token to make it the current token and
299 # yield the given block.
300 # If the block succeeds, return the token it used.
301 # Otherwise, render an error response based on the most specific
302 # error we encounter, and return nil.
303 most_specific_error = [401]
304 token_list.each do |api_token|
306 # We can't load the corresponding user, because the token may not
307 # be scoped for that.
308 using_specific_api_token(api_token, load_user: false) do
312 rescue ArvadosApiClient::ApiError => error
313 if error.api_status >= most_specific_error.first
314 most_specific_error = [error.api_status, error]
318 case most_specific_error.shift
322 render_not_found(*most_specific_error)
327 def keep_web_url(uuid_or_pdh, file, opts)
328 fmt = {uuid_or_pdh: uuid_or_pdh.sub('+', '-')}
329 uri = URI.parse(Rails.configuration.keep_web_url % fmt)
330 uri.path += '/' unless uri.path.end_with? '/'
332 uri.path += 't=' + opts[:path_token] + '/'
335 uri.path += CGI::escape(file)
338 { query_token: 'api_token',
339 disposition: 'disposition' }.each do |opt, param|
341 query_params << param + '=' + CGI::escape(opts[opt])
344 unless query_params.empty?
345 uri.query = query_params.join '&'
351 # Note: several controller and integration tests rely on stubbing
352 # file_enumerator to return fake file content.
353 def file_enumerator opts
354 FileStreamer.new opts
358 include ArvadosApiClientHelper
359 def initialize(opts={})
363 return unless @opts[:uuid] && @opts[:file]
368 u = URI.parse(arvados_api_client.arvados_v1_base)
369 env['ARVADOS_API_HOST'] = "#{u.host}:#{u.port}"
370 env['ARVADOS_API_TOKEN'] = @opts[:arvados_api_token]
371 env['ARVADOS_API_HOST_INSECURE'] = "true" if Rails.configuration.arvados_insecure_https
373 bytesleft = @opts[:maxbytes].andand.to_i || 2**16
374 io = IO.popen([env, 'arv-get', "#{@opts[:uuid]}/#{@opts[:file]}"], 'rb')
375 while bytesleft > 0 && (buf = io.read([bytesleft, 2**16].min)) != nil
376 # shrink the bytesleft count, if we were given a maximum byte
378 if @opts.include? :maxbytes
379 bytesleft = bytesleft - buf.length
384 # "If ios is opened by IO.popen, close sets $?."
385 # http://www.ruby-doc.org/core-2.1.3/IO.html#method-i-close
386 Rails.logger.warn("#{@opts[:uuid]}/#{@opts[:file]}: #{$?}") if $? != 0