X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/3bd5f6c3f353059c15eeea51b16b2fdee694d504..5b2ebfe3b248790efbce3206b693dd93f369ea4e:/services/api/app/middlewares/arvados_api_token.rb diff --git a/services/api/app/middlewares/arvados_api_token.rb b/services/api/app/middlewares/arvados_api_token.rb index 57d3ad02d7..6a37631827 100644 --- a/services/api/app/middlewares/arvados_api_token.rb +++ b/services/api/app/middlewares/arvados_api_token.rb @@ -1,3 +1,7 @@ +# Copyright (C) The Arvados Authors. All rights reserved. +# +# SPDX-License-Identifier: AGPL-3.0 + # Perform api_token checking very early in the request process. We want to do # this in the Rack stack instead of in ApplicationController because # websockets needs access to authentication but doesn't use any of the rails @@ -7,7 +11,7 @@ class ArvadosApiToken # Create a new ArvadosApiToken handler # +app+ The next layer of the Rack stack. def initialize(app = nil, options = nil) - @app = app if app.respond_to?(:call) + @app = app.respond_to?(:call) ? app : nil end def call env @@ -28,21 +32,33 @@ class ArvadosApiToken user = nil api_client = nil api_client_auth = nil - supplied_token = - params["api_token"] || - params["oauth_token"] || - env["HTTP_AUTHORIZATION"].andand.match(/OAuth2 ([a-z0-9]+)/).andand[1] - if supplied_token - api_client_auth = ApiClientAuthorization. + if request.get? || params["_method"] == 'GET' + reader_tokens = params["reader_tokens"] + if reader_tokens.is_a? String + reader_tokens = SafeJSON.load(reader_tokens) + end + else + reader_tokens = nil + end + + # Set current_user etc. based on the primary session token if a + # valid one is present. Otherwise, use the first valid token in + # reader_tokens. + [params["api_token"], + params["oauth_token"], + env["HTTP_AUTHORIZATION"].andand.match(/OAuth2 ([a-zA-Z0-9]+)/).andand[1], + *reader_tokens, + ].each do |supplied| + next if !supplied + try_auth = ApiClientAuthorization. includes(:api_client, :user). - where('api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)', supplied_token). + where('api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)', supplied). first - if api_client_auth.andand.user + if try_auth.andand.user + api_client_auth = try_auth user = api_client_auth.user api_client = api_client_auth.api_client - else - # Token seems valid, but points to a non-existent (deleted?) user. - api_client_auth = nil + break end end Thread.current[:api_client_ip_address] = remote_ip @@ -50,11 +66,6 @@ class ArvadosApiToken Thread.current[:api_client_uuid] = api_client.andand.uuid Thread.current[:api_client] = api_client Thread.current[:user] = user - if api_client_auth - api_client_auth.last_used_at = Time.now - api_client_auth.last_used_by_ip_address = remote_ip.to_s - api_client_auth.save validate: false - end @app.call env if @app end