X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/126dd750f48654cb3b1a4e53c5b7d337003e112f..7409b2f682d562cd7ef7bcf558597ae2181ea7c1:/services/api/app/models/arvados_model.rb diff --git a/services/api/app/models/arvados_model.rb b/services/api/app/models/arvados_model.rb index 5fdb5f3e2f..d1a0bc5794 100644 --- a/services/api/app/models/arvados_model.rb +++ b/services/api/app/models/arvados_model.rb @@ -46,6 +46,12 @@ class ArvadosModel < ActiveRecord::Base end end + class LockFailedError < StandardError + def http_status + 422 + end + end + class InvalidStateTransitionError < StandardError def http_status 422 @@ -98,6 +104,12 @@ class ArvadosModel < ActiveRecord::Base super(self.class.permit_attribute_params(raw_params), *args) end + # Reload "old attributes" for logging, too. + def reload(*args) + super + log_start_state + end + def self.create raw_params={}, *args super(permit_attribute_params(raw_params), *args) end @@ -184,6 +196,14 @@ class ArvadosModel < ActiveRecord::Base ["id", "uuid"] end + def self.limit_index_columns_read + # This method returns a list of column names. + # If an index request reads that column from the database, + # APIs that return lists will only fetch objects until reaching + # max_index_database_read bytes of data from those columns. + [] + end + # If current user can manage the object, return an array of uuids of # users and groups that have permission to write the object. The # first two elements are always [self.owner_uuid, current user's @@ -230,7 +250,8 @@ class ArvadosModel < ActiveRecord::Base # Check if any of the users are admin. If so, we're done. if users_list.select { |u| u.is_admin }.any? - return self + # Return existing relation with no new filters. + return where({}) end # Collect the UUIDs of the authorized users. @@ -415,36 +436,31 @@ class ArvadosModel < ActiveRecord::Base raise PermissionDeniedError end - # Verify "write" permission on old owner - # default fail unless one of: - # owner_uuid did not change - # previous owner_uuid is nil - # current user is the old owner - # current user is this object - # current user can_write old owner - unless !owner_uuid_changed? or - owner_uuid_was.nil? or - current_user.uuid == self.owner_uuid_was or - current_user.uuid == self.uuid or - current_user.can? write: self.owner_uuid_was - logger.warn "User #{current_user.uuid} tried to modify #{self.class.to_s} #{uuid} but does not have permission to write old owner_uuid #{owner_uuid_was}" - errors.add :owner_uuid, "cannot be changed without write permission on old owner" - raise PermissionDeniedError - end - - # Verify "write" permission on new owner - # default fail unless one of: - # current_user is this object - # current user can_write new owner, or this object if owner unchanged - if new_record? or owner_uuid_changed? or is_a?(ApiClientAuthorization) - write_target = owner_uuid + if new_record? || owner_uuid_changed? + # Permission on owner_uuid_was is needed to move an existing + # object away from its previous owner (which implies permission + # to modify this object itself, so we don't need to check that + # separately). Permission on the new owner_uuid is also needed. + [['old', owner_uuid_was], + ['new', owner_uuid] + ].each do |which, check_uuid| + if check_uuid.nil? + # old_owner_uuid is nil? New record, no need to check. + elsif !current_user.can?(write: check_uuid) + logger.warn "User #{current_user.uuid} tried to set ownership of #{self.class.to_s} #{self.uuid} but does not have permission to write #{which} owner_uuid #{check_uuid}" + errors.add :owner_uuid, "cannot be set or changed without write permission on #{which} owner" + raise PermissionDeniedError + end + end else - write_target = uuid - end - unless current_user == self or current_user.can? write: write_target - logger.warn "User #{current_user.uuid} tried to modify #{self.class.to_s} #{uuid} but does not have permission to write new owner_uuid #{owner_uuid}" - errors.add :owner_uuid, "cannot be changed without write permission on new owner" - raise PermissionDeniedError + # If the object already existed and we're not changing + # owner_uuid, we only need write permission on the object + # itself. + if !current_user.can?(write: self.uuid) + logger.warn "User #{current_user.uuid} tried to modify #{self.class.to_s} #{self.uuid} without write permission" + errors.add :uuid, "is not writable" + raise PermissionDeniedError + end end true