X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/1e3f8ceebd90058e902494fae84b1fd57ac6693b..8f987a9271eda80697b3a8fc53e7ebb0f93816f9:/services/api/app/middlewares/arvados_api_token.rb diff --git a/services/api/app/middlewares/arvados_api_token.rb b/services/api/app/middlewares/arvados_api_token.rb index fa8d9871fe..4098fd72ca 100644 --- a/services/api/app/middlewares/arvados_api_token.rb +++ b/services/api/app/middlewares/arvados_api_token.rb @@ -20,14 +20,40 @@ class ArvadosApiToken remote_ip = env["action_dispatch.remote_ip"] Thread.current[:request_starttime] = Time.now - Thread.current[:supplied_token] = - params["api_token"] || - params["oauth_token"] || - env["HTTP_AUTHORIZATION"].andand. - match(/(OAuth2|Bearer) ([-\/a-zA-Z0-9]+)/).andand[2] - - auth = ApiClientAuthorization. - validate(token: Thread.current[:supplied_token], remote: false) + + remote = false + reader_tokens = nil + if params["remote"] && request.get? && ( + request.path.start_with?('/arvados/v1/groups') || + request.path.start_with?('/arvados/v1/users/current')) + # Request from a remote API server, asking to validate a salted + # token. + remote = params["remote"] + elsif request.get? || params["_method"] == 'GET' + reader_tokens = params["reader_tokens"] + if reader_tokens.is_a? String + reader_tokens = SafeJSON.load(reader_tokens) + end + end + + # Set current_user etc. based on the primary session token if a + # valid one is present. Otherwise, use the first valid token in + # reader_tokens. + auth = nil + [params["api_token"], + params["oauth_token"], + env["HTTP_AUTHORIZATION"].andand.match(/(OAuth2|Bearer) ([-\/a-zA-Z0-9]+)/).andand[2], + *reader_tokens, + ].each do |supplied| + next if !supplied + try_auth = ApiClientAuthorization. + validate(token: supplied, remote: remote) + if try_auth.andand.user + auth = try_auth + break + end + end + Thread.current[:api_client_ip_address] = remote_ip Thread.current[:api_client_authorization] = auth Thread.current[:api_client_uuid] = auth.andand.api_client.andand.uuid