11453: Accept salted tokens at /users/current and /groups.
[arvados.git] / services / api / app / middlewares / arvados_api_token.rb
index 57d3ad02d748d7ee41540c0320ef8f068a8d375a..6dcadb01e24e30aa1ee884b2add646495624b2f7 100644 (file)
@@ -1,3 +1,7 @@
+# Copyright (C) The Arvados Authors. All rights reserved.
+#
+# SPDX-License-Identifier: AGPL-3.0
+
 # Perform api_token checking very early in the request process.  We want to do
 # this in the Rack stack instead of in ApplicationController because
 # websockets needs access to authentication but doesn't use any of the rails
@@ -7,13 +11,14 @@ class ArvadosApiToken
   # Create a new ArvadosApiToken handler
   # +app+  The next layer of the Rack stack.
   def initialize(app = nil, options = nil)
-    @app = app if app.respond_to?(:call)
+    @app = app.respond_to?(:call) ? app : nil
   end
 
   def call env
     # First, clean up just in case we have a multithreaded server and thread
     # local variables are still set from a prior request.  Also useful for
     # tests that call this code to set up the environment.
+    Thread.current[:supplied_token] = nil
     Thread.current[:api_client_ip_address] = nil
     Thread.current[:api_client_authorization] = nil
     Thread.current[:api_client_uuid] = nil
@@ -31,29 +36,41 @@ class ArvadosApiToken
     supplied_token =
       params["api_token"] ||
       params["oauth_token"] ||
-      env["HTTP_AUTHORIZATION"].andand.match(/OAuth2 ([a-z0-9]+)/).andand[1]
+      env["HTTP_AUTHORIZATION"].andand.match(/(OAuth2|Bearer) ([-,a-zA-Z0-9]+)/).andand[2]
     if supplied_token
-      api_client_auth = ApiClientAuthorization.
-        includes(:api_client, :user).
-        where('api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)', supplied_token).
-        first
-      if api_client_auth.andand.user
-        user = api_client_auth.user
-        api_client = api_client_auth.api_client
+      case supplied_token[0..2]
+      when 'v2,'
+        _, uuid, secret = supplied_token.split(',')
+        auth = ApiClientAuthorization.
+               includes(:api_client, :user).
+               where('uuid=? and api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)',
+                     uuid, secret).
+               first
+      else
+        auth = ApiClientAuthorization.
+               includes(:api_client, :user).
+               where('api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)',
+                     supplied_token).
+               first
+      end
+      if auth.andand.user
+        user = auth.user
+        api_client = auth.api_client
       else
-        # Token seems valid, but points to a non-existent (deleted?) user.
-        api_client_auth = nil
+        # Token is invalid, or belongs to a non-existent (deleted?) user.
+        auth = nil
       end
     end
+    Thread.current[:supplied_token] = supplied_token
     Thread.current[:api_client_ip_address] = remote_ip
-    Thread.current[:api_client_authorization] = api_client_auth
+    Thread.current[:api_client_authorization] = auth
     Thread.current[:api_client_uuid] = api_client.andand.uuid
     Thread.current[:api_client] = api_client
     Thread.current[:user] = user
-    if api_client_auth
-      api_client_auth.last_used_at = Time.now
-      api_client_auth.last_used_by_ip_address = remote_ip.to_s
-      api_client_auth.save validate: false
+    if auth
+      auth.last_used_at = Time.now
+      auth.last_used_by_ip_address = remote_ip.to_s
+      auth.save validate: false
     end
 
     @app.call env if @app