1 # Copyright (C) The Arvados Authors. All rights reserved.
3 # SPDX-License-Identifier: AGPL-3.0
6 require "arvados/collection"
9 class CollectionsController < ApplicationController
10 include ActionController::Live
12 skip_around_filter :require_thread_api_token, if: proc { |ctrl|
13 Rails.configuration.anonymous_user_token and
14 'show' == ctrl.action_name
16 skip_around_filter(:require_thread_api_token,
17 only: [:show_file, :show_file_links])
18 skip_before_filter(:find_object_by_uuid,
19 only: [:provenance, :show_file, :show_file_links])
20 # We depend on show_file to display the user agreement:
21 skip_before_filter :check_user_agreements, only: :show_file
22 skip_before_filter :check_user_profile, only: :show_file
27 panes = %w(Files Upload Tags Provenance_graph Used_by Advanced)
28 panes = panes - %w(Upload) unless (@object.editable? rescue false)
34 when 'persistent', 'cache'
35 persist_links = Link.filter([['owner_uuid', '=', current_user.uuid],
36 ['link_class', '=', 'resources'],
37 ['name', '=', 'wants'],
38 ['tail_uuid', '=', current_user.uuid],
39 ['head_uuid', '=', @object.uuid]])
40 logger.debug persist_links.inspect
42 return unprocessable "Invalid value #{value.inspect}"
44 if params[:value] == 'persistent'
45 if not persist_links.any?
46 Link.create(link_class: 'resources',
48 tail_uuid: current_user.uuid,
49 head_uuid: @object.uuid)
52 persist_links.each do |link|
58 f.json { render json: @object }
63 # API server index doesn't return manifest_text by default, but our
64 # callers want it unless otherwise specified.
65 @select ||= Collection.columns.map(&:name)
66 base_search = Collection.select(@select)
67 if params[:search].andand.length.andand > 0
68 tags = Link.where(any: ['contains', params[:search]])
69 @objects = (base_search.where(uuid: tags.collect(&:head_uuid)) |
70 base_search.where(any: ['contains', params[:search]])).
74 limit = params[:limit].to_i
80 offset = params[:offset].to_i
85 @objects = base_search.limit(limit).offset(offset)
87 @links = Link.where(head_uuid: @objects.collect(&:uuid))
90 @collection_info[c.uuid] = {
99 @collection_info[link.head_uuid] ||= {}
100 info = @collection_info[link.head_uuid]
103 info[:tag_links] << link
106 info[:wanted_by_me] ||= link.tail_uuid == current_user.uuid
108 info[:provenance] << link.name
112 @request_url = request.url
122 # The order of searched tokens is important: because the anonymous user
123 # token is passed along with every API request, we have to check it first.
124 # Otherwise, it's impossible to know whether any other request succeeded
125 # because of the reader token.
127 tokens = [(Rails.configuration.anonymous_user_token || nil),
128 params[:reader_token],
129 Thread.current[:arvados_api_token]].compact
130 usable_token = find_usable_token(tokens) do
131 coll = Collection.find(params[:uuid])
134 # Response already rendered.
139 if usable_token == params[:reader_token]
140 opts[:path_token] = usable_token
141 elsif usable_token == Rails.configuration.anonymous_user_token
142 # Don't pass a token at all
144 # We pass the current user's real token only if it's necessary
145 # to read the collection.
146 opts[:query_token] = usable_token
148 opts[:disposition] = params[:disposition] if params[:disposition]
149 return redirect_to keep_web_url(params[:uuid], params[:file], opts)
153 ["GET /arvados/v1/collections/#{@object.uuid}", "GET /arvados/v1/collections/#{@object.uuid}/", "GET /arvados/v1/keep_services/accessible"]
158 ApiClientAuthorization.filter([['scopes', '=', sharing_scopes]]).results
159 rescue ArvadosApiClient::AccessForbiddenException
164 def find_object_by_uuid
165 if not Keep::Locator.parse params[:id]
171 return super if !@object
175 if params["tab_pane"] == "Provenance_graph"
176 @prov_svg = ProvenanceHelper::create_provenance_graph(@object.provenance, "provenance_svg",
177 {:request => request,
178 :direction => :top_down,
179 :combine_jobs => :script_only}) rescue nil
183 if Keep::Locator.parse params["uuid"]
184 @same_pdh = Collection.filter([["portable_data_hash", "=", @object.portable_data_hash]]).limit(20)
185 if @same_pdh.results.size == 1
186 redirect_to collection_path(@same_pdh[0]["uuid"])
189 owners = @same_pdh.map(&:owner_uuid).to_a.uniq
190 preload_objects_for_dataclass Group, owners
191 preload_objects_for_dataclass User, owners
192 uuids = @same_pdh.map(&:uuid).to_a.uniq
193 preload_links_for_objects uuids
194 render 'hash_matches'
197 if Job.api_exists?(:index)
198 jobs_with = lambda do |conds|
199 Job.limit(RELATION_LIMIT).where(conds)
200 .results.sort_by { |j| j.finished_at || j.created_at }
202 @output_of = jobs_with.call(output: @object.portable_data_hash)
203 @log_of = jobs_with.call(log: @object.portable_data_hash)
206 @project_links = Link.limit(RELATION_LIMIT).order("modified_at DESC")
207 .where(head_uuid: @object.uuid, link_class: 'name').results
208 project_hash = Group.where(uuid: @project_links.map(&:tail_uuid)).to_hash
209 @projects = project_hash.values
211 @permissions = Link.limit(RELATION_LIMIT).order("modified_at DESC")
212 .where(head_uuid: @object.uuid, link_class: 'permission',
213 name: 'can_read').results
214 @search_sharing = search_scopes
216 if params["tab_pane"] == "Used_by"
217 @used_by_svg = ProvenanceHelper::create_provenance_graph(@object.used_by, "used_by_svg",
218 {:request => request,
219 :direction => :top_down,
220 :combine_jobs => :script_only,
221 :pdata_only => true}) rescue nil
229 @search_sharing = search_scopes
230 render("sharing_popup.js", content_type: "text/javascript")
233 helper_method :download_link
236 token = @search_sharing.first.api_token
237 keep_web_url(@object.uuid, nil, {path_token: token})
241 ApiClientAuthorization.create(scopes: sharing_scopes)
246 search_scopes.each do |s|
252 def remove_selected_files
253 uuids, source_paths = selected_collection_files params
255 arv_coll = Arv::Collection.new(@object.manifest_text)
256 source_paths[uuids[0]].each do |p|
260 if @object.update_attributes manifest_text: arv_coll.manifest_text
263 self.render_error status: 422
268 updated_attr = params[:collection].each.select {|a| a[0].andand.start_with? 'rename-file-path:'}
270 if updated_attr.size > 0
272 file_path = updated_attr[0][0].split('rename-file-path:')[-1]
274 new_file_path = updated_attr[0][1]
275 if new_file_path.start_with?('./')
277 elsif new_file_path.start_with?('/')
278 new_file_path = '.' + new_file_path
280 new_file_path = './' + new_file_path
283 arv_coll = Arv::Collection.new(@object.manifest_text)
285 if arv_coll.exist?(new_file_path)
286 @errors = 'Duplicate file path. Please use a different name.'
287 self.render_error status: 422
289 arv_coll.rename "./"+file_path, new_file_path
291 if @object.update_attributes manifest_text: arv_coll.manifest_text
294 self.render_error status: 422
298 # Not a file rename; use default
305 def find_usable_token(token_list)
306 # Iterate over every given token to make it the current token and
307 # yield the given block.
308 # If the block succeeds, return the token it used.
309 # Otherwise, render an error response based on the most specific
310 # error we encounter, and return nil.
311 most_specific_error = [401]
312 token_list.each do |api_token|
314 # We can't load the corresponding user, because the token may not
315 # be scoped for that.
316 using_specific_api_token(api_token, load_user: false) do
320 rescue ArvadosApiClient::ApiError => error
321 if error.api_status >= most_specific_error.first
322 most_specific_error = [error.api_status, error]
326 case most_specific_error.shift
330 render_not_found(*most_specific_error)
335 def keep_web_url(uuid_or_pdh, file, opts)
336 munged_id = uuid_or_pdh.sub('+', '-')
337 fmt = {uuid_or_pdh: munged_id}
339 tmpl = Rails.configuration.keep_web_url
340 if Rails.configuration.keep_web_download_url and
341 (!tmpl or opts[:disposition] == 'attachment')
342 # Prefer the attachment-only-host when we want an attachment
343 # (and when there is no preview link configured)
344 tmpl = Rails.configuration.keep_web_download_url
345 elsif not Rails.configuration.trust_all_content
346 check_uri = URI.parse(tmpl % fmt)
347 if opts[:query_token] and
348 not check_uri.host.start_with?(munged_id + "--") and
349 not check_uri.host.start_with?(munged_id + ".")
350 # We're about to pass a token in the query string, but
351 # keep-web can't accept that safely at a single-origin URL
352 # template (unless it's -attachment-only-host).
353 tmpl = Rails.configuration.keep_web_download_url
355 raise ArgumentError, "Download precluded by site configuration"
357 logger.warn("Using download link, even though inline content " \
358 "was requested: #{check_uri.to_s}")
362 if tmpl == Rails.configuration.keep_web_download_url
363 # This takes us to keep-web's -attachment-only-host so there is
364 # no need to add ?disposition=attachment.
365 opts.delete :disposition
368 uri = URI.parse(tmpl % fmt)
369 uri.path += '/' unless uri.path.end_with? '/'
371 uri.path += 't=' + opts[:path_token] + '/'
374 uri.path += URI.escape(file) if file
376 query = Hash[URI.decode_www_form(uri.query || '')]
377 { query_token: 'api_token',
378 disposition: 'disposition' }.each do |opt, param|
380 query[param] = opts[opt]
384 uri.query = URI.encode_www_form(query)