X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/0df5f0feeced5bff0adfb806dae2d3811257827f..9d3ace1fdba783134eb5557a9b28f8132df552de:/services/api/app/controllers/arvados/v1/users_controller.rb diff --git a/services/api/app/controllers/arvados/v1/users_controller.rb b/services/api/app/controllers/arvados/v1/users_controller.rb index 18b6b46d26..ded86aa66d 100644 --- a/services/api/app/controllers/arvados/v1/users_controller.rb +++ b/services/api/app/controllers/arvados/v1/users_controller.rb @@ -4,12 +4,55 @@ class Arvados::V1::UsersController < ApplicationController accept_attribute_as_json :prefs, Hash + accept_param_as_json :updates skip_before_action :find_object_by_uuid, only: - [:activate, :current, :system, :setup, :merge] + [:activate, :current, :system, :setup, :merge, :batch_update] skip_before_action :render_404_if_no_object, only: - [:activate, :current, :system, :setup, :merge] - before_action :admin_required, only: [:setup, :unsetup, :update_uuid] + [:activate, :current, :system, :setup, :merge, :batch_update] + before_action :admin_required, only: [:setup, :unsetup, :batch_update] + + # Internal API used by controller to update local cache of user + # records from LoginCluster. + def batch_update + @objects = [] + params[:updates].andand.each do |uuid, attrs| + begin + u = User.find_or_create_by(uuid: uuid) + rescue ActiveRecord::RecordNotUnique + retry + end + needupdate = {} + nullify_attrs(attrs).each do |k,v| + if !v.nil? && u.send(k) != v + needupdate[k] = v + end + end + if needupdate.length > 0 + begin + u.update_attributes!(needupdate) + rescue ActiveRecord::RecordInvalid + loginCluster = Rails.configuration.Login.LoginCluster + if u.uuid[0..4] == loginCluster && !needupdate[:username].nil? + local_user = User.find_by_username(needupdate[:username]) + # A cached user record from the LoginCluster is stale, reset its username + # and retry the update operation. + if local_user.andand.uuid[0..4] == loginCluster && local_user.uuid != u.uuid + new_username = "#{needupdate[:username]}conflict#{rand(99999999)}" + Rails.logger.warn("cached username '#{needupdate[:username]}' collision with user '#{local_user.uuid}' - renaming to '#{new_username}' before retrying") + local_user.update_attributes!({username: new_username}) + retry + end + end + raise # Not the issue we're handling above + end + end + @objects << u + end + @offset = 0 + @limit = -1 + render_list + end def current if current_user @@ -26,13 +69,20 @@ class Arvados::V1::UsersController < ApplicationController end def activate + if params[:id] and params[:id].match(/\D/) + params[:uuid] = params.delete :id + end if current_user.andand.is_admin && params[:uuid] - @object = User.find params[:uuid] + @object = User.find_by_uuid params[:uuid] else @object = current_user end if not @object.is_active - if not (current_user.is_admin or @object.is_invited) + if @object.uuid[0..4] == Rails.configuration.Login.LoginCluster && + @object.uuid[0..4] != Rails.configuration.ClusterID + logger.warn "Local user #{@object.uuid} called users#activate but only LoginCluster can do that" + raise ArgumentError.new "cannot activate user #{@object.uuid} here, only the #{@object.uuid[0..4]} cluster can do that" + elsif not (current_user.is_admin or @object.is_invited) logger.warn "User #{@object.uuid} called users.activate " + "but is not invited" raise ArgumentError.new "Cannot activate without being invited." @@ -77,8 +127,6 @@ class Arvados::V1::UsersController < ApplicationController raise ArgumentError.new "Required uuid or user" elsif !params[:user]['email'] raise ArgumentError.new "Require user email" - elsif !params[:openid_prefix] - raise ArgumentError.new "Required openid_prefix parameter is missing." else @object = model_class.create! resource_attrs end @@ -101,12 +149,7 @@ class Arvados::V1::UsersController < ApplicationController @response = @object.setup(repo_name: full_repo_name, vm_uuid: params[:vm_uuid], - openid_prefix: params[:openid_prefix]) - - # setup succeeded. send email to user - if params[:send_notification_email] - UserNotifier.account_is_setup(@object).deliver_now - end + send_notification_email: params[:send_notification_email]) send_json kind: "arvados#HashList", items: @response.as_api_response(nil) end @@ -118,47 +161,61 @@ class Arvados::V1::UsersController < ApplicationController show end - # Change UUID to a new (unused) uuid and transfer all owned/linked - # objects accordingly. - def update_uuid - @object.update_uuid(new_uuid: params[:new_uuid]) - show - end - def merge - if !Thread.current[:api_client].andand.is_trusted - return send_error("supplied API token is not from a trusted client", status: 403) - elsif Thread.current[:api_client_authorization].scopes != ['all'] - return send_error("cannot merge with a scoped token", status: 403) - end + if (params[:old_user_uuid] || params[:new_user_uuid]) + if !current_user.andand.is_admin + return send_error("Must be admin to use old_user_uuid/new_user_uuid", status: 403) + end + if !params[:old_user_uuid] || !params[:new_user_uuid] + return send_error("Must supply both old_user_uuid and new_user_uuid", status: 422) + end + new_user = User.find_by_uuid(params[:new_user_uuid]) + if !new_user + return send_error("User in new_user_uuid not found", status: 422) + end + @object = User.find_by_uuid(params[:old_user_uuid]) + if !@object + return send_error("User in old_user_uuid not found", status: 422) + end + else + if !Thread.current[:api_client].andand.is_trusted + return send_error("supplied API token is not from a trusted client", status: 403) + elsif Thread.current[:api_client_authorization].scopes != ['all'] + return send_error("cannot merge with a scoped token", status: 403) + end - new_auth = ApiClientAuthorization.validate(token: params[:new_user_token]) - if !new_auth - return send_error("invalid new_user_token", status: 401) - end - if !new_auth.api_client.andand.is_trusted - return send_error("supplied new_user_token is not from a trusted client", status: 403) - elsif new_auth.scopes != ['all'] - return send_error("supplied new_user_token has restricted scope", status: 403) + new_auth = ApiClientAuthorization.validate(token: params[:new_user_token]) + if !new_auth + return send_error("invalid new_user_token", status: 401) + end + + if new_auth.user.uuid[0..4] == Rails.configuration.ClusterID + if !new_auth.api_client.andand.is_trusted + return send_error("supplied new_user_token is not from a trusted client", status: 403) + elsif new_auth.scopes != ['all'] + return send_error("supplied new_user_token has restricted scope", status: 403) + end + end + new_user = new_auth.user + @object = current_user end - new_user = new_auth.user - if current_user.uuid == new_user.uuid + if @object.uuid == new_user.uuid return send_error("cannot merge user to self", status: 422) end - if !new_user.can?(write: params[:new_owner_uuid]) - return send_error("cannot move objects into supplied new_owner_uuid: new user does not have write permission", status: 403) + if !params[:new_owner_uuid] + return send_error("missing new_owner_uuid", status: 422) end - redirect = params[:redirect_to_new_user] - if !redirect - return send_error("merge with redirect_to_new_user=false is not yet supported", status: 422) + if !new_user.can?(write: params[:new_owner_uuid]) + return send_error("cannot move objects into supplied new_owner_uuid: new user does not have write permission", status: 403) end - @object = current_user act_as_system_user do - @object.merge(new_owner_uuid: params[:new_owner_uuid], redirect_to_user_uuid: redirect && new_user.uuid) + @object.merge(new_owner_uuid: params[:new_owner_uuid], + new_user_uuid: new_user.uuid, + redirect_to_new_user: params[:redirect_to_new_user]) end show end @@ -171,47 +228,53 @@ class Arvados::V1::UsersController < ApplicationController type: 'string', required: true, }, new_user_token: { - type: 'string', required: true, + type: 'string', required: false, }, redirect_to_new_user: { - type: 'boolean', required: false, + type: 'boolean', required: false, default: false, + }, + old_user_uuid: { + type: 'string', required: false, }, + new_user_uuid: { + type: 'string', required: false, + } } end def self._setup_requires_parameters { - user: { - type: 'object', required: false + uuid: { + type: 'string', required: false, }, - openid_prefix: { - type: 'string', required: false + user: { + type: 'object', required: false, }, repo_name: { - type: 'string', required: false + type: 'string', required: false, }, vm_uuid: { - type: 'string', required: false + type: 'string', required: false, }, send_notification_email: { - type: 'boolean', required: false, default: false + type: 'boolean', required: false, default: false, }, } end - def self._update_uuid_requires_parameters - { - new_uuid: { - type: 'string', required: true, + def self._update_requires_parameters + super.merge({ + bypass_federation: { + type: 'boolean', required: false, default: false, }, - } + }) end def apply_filters(model_class=nil) return super if @read_users.any?(&:is_admin) if params[:uuid] != current_user.andand.uuid # Non-admin index/show returns very basic information about readable users. - safe_attrs = ["uuid", "is_active", "email", "first_name", "last_name", "username"] + safe_attrs = ["uuid", "is_active", "email", "first_name", "last_name", "username", "can_write", "can_manage", "kind"] if @select @select = @select & safe_attrs else @@ -219,6 +282,17 @@ class Arvados::V1::UsersController < ApplicationController end @filters += [['is_active', '=', true]] end + # This gets called from within find_object_by_uuid. + # find_object_by_uuid stores the original value of @select in + # @preserve_select, edits the value of @select, calls + # find_objects_for_index, then restores @select from the value + # of @preserve_select. So if we want our updated value of + # @select here to stick, we have to set @preserve_select. + @preserve_select = @select super end + + def nullable_attributes + super + [:email, :first_name, :last_name, :username] + end end