Merge branch '15933-setup-uuid-param' refs #15933
[arvados.git] / services / api / app / controllers / arvados / v1 / users_controller.rb
1 # Copyright (C) The Arvados Authors. All rights reserved.
2 #
3 # SPDX-License-Identifier: AGPL-3.0
4
5 class Arvados::V1::UsersController < ApplicationController
6   accept_attribute_as_json :prefs, Hash
7   accept_param_as_json :updates
8
9   skip_before_action :find_object_by_uuid, only:
10     [:activate, :current, :system, :setup, :merge, :batch_update]
11   skip_before_action :render_404_if_no_object, only:
12     [:activate, :current, :system, :setup, :merge, :batch_update]
13   before_action :admin_required, only: [:setup, :unsetup, :update_uuid, :batch_update]
14
15   # Internal API used by controller to update local cache of user
16   # records from LoginCluster.
17   def batch_update
18     @objects = []
19     params[:updates].andand.each do |uuid, attrs|
20       begin
21         u = User.find_or_create_by(uuid: uuid)
22       rescue ActiveRecord::RecordNotUnique
23         retry
24       end
25       u.update_attributes!(attrs)
26       @objects << u
27     end
28     @offset = 0
29     @limit = -1
30     render_list
31   end
32
33   def current
34     if current_user
35       @object = current_user
36       show
37     else
38       send_error("Not logged in", status: 401)
39     end
40   end
41
42   def system
43     @object = system_user
44     show
45   end
46
47   def activate
48     if current_user.andand.is_admin && params[:uuid]
49       @object = User.find params[:uuid]
50     else
51       @object = current_user
52     end
53     if not @object.is_active
54       if not (current_user.is_admin or @object.is_invited)
55         logger.warn "User #{@object.uuid} called users.activate " +
56           "but is not invited"
57         raise ArgumentError.new "Cannot activate without being invited."
58       end
59       act_as_system_user do
60         required_uuids = Link.where("owner_uuid = ? and link_class = ? and name = ? and tail_uuid = ? and head_uuid like ?",
61                                     system_user_uuid,
62                                     'signature',
63                                     'require',
64                                     system_user_uuid,
65                                     Collection.uuid_like_pattern).
66           collect(&:head_uuid)
67         signed_uuids = Link.where(owner_uuid: system_user_uuid,
68                                   link_class: 'signature',
69                                   name: 'click',
70                                   tail_uuid: @object.uuid,
71                                   head_uuid: required_uuids).
72           collect(&:head_uuid)
73         todo_uuids = required_uuids - signed_uuids
74         if todo_uuids.empty?
75           @object.update_attributes is_active: true
76           logger.info "User #{@object.uuid} activated"
77         else
78           logger.warn "User #{@object.uuid} called users.activate " +
79             "before signing agreements #{todo_uuids.inspect}"
80           raise ArvadosModel::PermissionDeniedError.new \
81           "Cannot activate without user agreements #{todo_uuids.inspect}."
82         end
83       end
84     end
85     show
86   end
87
88   # create user object and all the needed links
89   def setup
90     if params[:uuid]
91       @object = User.find_by_uuid(params[:uuid])
92       if !@object
93         return render_404_if_no_object
94       end
95     elsif !params[:user] || params[:user].empty?
96       raise ArgumentError.new "Required uuid or user"
97     elsif !params[:user]['email']
98       raise ArgumentError.new "Require user email"
99     else
100       @object = model_class.create! resource_attrs
101     end
102
103     # It's not always possible for the client to know the user's
104     # username when submitting this request: the username might have
105     # been assigned automatically in create!() above. If client
106     # provided a plain repository name, prefix it with the username
107     # now that we know what it is.
108     if params[:repo_name].nil?
109       full_repo_name = nil
110     elsif @object.username.nil?
111       raise ArgumentError.
112         new("cannot setup a repository because user has no username")
113     elsif params[:repo_name].index("/")
114       full_repo_name = params[:repo_name]
115     else
116       full_repo_name = "#{@object.username}/#{params[:repo_name]}"
117     end
118
119     @response = @object.setup(repo_name: full_repo_name,
120                               vm_uuid: params[:vm_uuid])
121
122     # setup succeeded. send email to user
123     if params[:send_notification_email]
124       UserNotifier.account_is_setup(@object).deliver_now
125     end
126
127     send_json kind: "arvados#HashList", items: @response.as_api_response(nil)
128   end
129
130   # delete user agreements, vm, repository, login links; set state to inactive
131   def unsetup
132     reload_object_before_update
133     @object.unsetup
134     show
135   end
136
137   # Change UUID to a new (unused) uuid and transfer all owned/linked
138   # objects accordingly.
139   def update_uuid
140     @object.update_uuid(new_uuid: params[:new_uuid])
141     show
142   end
143
144   def merge
145     if (params[:old_user_uuid] || params[:new_user_uuid])
146       if !current_user.andand.is_admin
147         return send_error("Must be admin to use old_user_uuid/new_user_uuid", status: 403)
148       end
149       if !params[:old_user_uuid] || !params[:new_user_uuid]
150         return send_error("Must supply both old_user_uuid and new_user_uuid", status: 422)
151       end
152       new_user = User.find_by_uuid(params[:new_user_uuid])
153       if !new_user
154         return send_error("User in new_user_uuid not found", status: 422)
155       end
156       @object = User.find_by_uuid(params[:old_user_uuid])
157       if !@object
158         return send_error("User in old_user_uuid not found", status: 422)
159       end
160     else
161       if !Thread.current[:api_client].andand.is_trusted
162         return send_error("supplied API token is not from a trusted client", status: 403)
163       elsif Thread.current[:api_client_authorization].scopes != ['all']
164         return send_error("cannot merge with a scoped token", status: 403)
165       end
166
167       new_auth = ApiClientAuthorization.validate(token: params[:new_user_token])
168       if !new_auth
169         return send_error("invalid new_user_token", status: 401)
170       end
171
172       if new_auth.user.uuid[0..4] == Rails.configuration.ClusterID
173         if !new_auth.api_client.andand.is_trusted
174           return send_error("supplied new_user_token is not from a trusted client", status: 403)
175         elsif new_auth.scopes != ['all']
176           return send_error("supplied new_user_token has restricted scope", status: 403)
177         end
178       end
179       new_user = new_auth.user
180       @object = current_user
181     end
182
183     if @object.uuid == new_user.uuid
184       return send_error("cannot merge user to self", status: 422)
185     end
186
187     if !params[:new_owner_uuid]
188       return send_error("missing new_owner_uuid", status: 422)
189     end
190
191     if !new_user.can?(write: params[:new_owner_uuid])
192       return send_error("cannot move objects into supplied new_owner_uuid: new user does not have write permission", status: 403)
193     end
194
195     act_as_system_user do
196       @object.merge(new_owner_uuid: params[:new_owner_uuid],
197                     new_user_uuid: new_user.uuid,
198                     redirect_to_new_user: params[:redirect_to_new_user])
199     end
200     show
201   end
202
203   protected
204
205   def self._merge_requires_parameters
206     {
207       new_owner_uuid: {
208         type: 'string', required: true,
209       },
210       new_user_token: {
211         type: 'string', required: false,
212       },
213       redirect_to_new_user: {
214         type: 'boolean', required: false,
215       },
216       old_user_uuid: {
217         type: 'string', required: false,
218       },
219       new_user_uuid: {
220         type: 'string', required: false,
221       }
222     }
223   end
224
225   def self._setup_requires_parameters
226     {
227       uuid: {
228         type: 'string', required: false
229       },
230       user: {
231         type: 'object', required: false
232       },
233       repo_name: {
234         type: 'string', required: false
235       },
236       vm_uuid: {
237         type: 'string', required: false
238       },
239       send_notification_email: {
240         type: 'boolean', required: false, default: false
241       },
242     }
243   end
244
245   def self._update_uuid_requires_parameters
246     {
247       new_uuid: {
248         type: 'string', required: true,
249       },
250     }
251   end
252
253   def apply_filters(model_class=nil)
254     return super if @read_users.any?(&:is_admin)
255     if params[:uuid] != current_user.andand.uuid
256       # Non-admin index/show returns very basic information about readable users.
257       safe_attrs = ["uuid", "is_active", "email", "first_name", "last_name", "username"]
258       if @select
259         @select = @select & safe_attrs
260       else
261         @select = safe_attrs
262       end
263       @filters += [['is_active', '=', true]]
264     end
265     super
266   end
267 end