X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/0e659500b47d9bd4dc3e4c96167b3e55ac14082f..794cecd80b3fc3c9812687fa9e4e269fb1e79c60:/services/api/app/middlewares/arvados_api_token.rb diff --git a/services/api/app/middlewares/arvados_api_token.rb b/services/api/app/middlewares/arvados_api_token.rb index dace944930..4098fd72ca 100644 --- a/services/api/app/middlewares/arvados_api_token.rb +++ b/services/api/app/middlewares/arvados_api_token.rb @@ -20,18 +20,38 @@ class ArvadosApiToken remote_ip = env["action_dispatch.remote_ip"] Thread.current[:request_starttime] = Time.now - Thread.current[:supplied_token] = - params["api_token"] || - params["oauth_token"] || - env["HTTP_AUTHORIZATION"].andand. - match(/(OAuth2|Bearer) ([-\/a-zA-Z0-9]+)/).andand[2] - - auth = ApiClientAuthorization. - validate(token: Thread.current[:supplied_token], remote: false) - if auth - auth.last_used_at = Time.now - auth.last_used_by_ip_address = remote_ip.to_s - auth.save validate: false + + remote = false + reader_tokens = nil + if params["remote"] && request.get? && ( + request.path.start_with?('/arvados/v1/groups') || + request.path.start_with?('/arvados/v1/users/current')) + # Request from a remote API server, asking to validate a salted + # token. + remote = params["remote"] + elsif request.get? || params["_method"] == 'GET' + reader_tokens = params["reader_tokens"] + if reader_tokens.is_a? String + reader_tokens = SafeJSON.load(reader_tokens) + end + end + + # Set current_user etc. based on the primary session token if a + # valid one is present. Otherwise, use the first valid token in + # reader_tokens. + auth = nil + [params["api_token"], + params["oauth_token"], + env["HTTP_AUTHORIZATION"].andand.match(/(OAuth2|Bearer) ([-\/a-zA-Z0-9]+)/).andand[2], + *reader_tokens, + ].each do |supplied| + next if !supplied + try_auth = ApiClientAuthorization. + validate(token: supplied, remote: remote) + if try_auth.andand.user + auth = try_auth + break + end end Thread.current[:api_client_ip_address] = remote_ip