X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/57dbb702fde186b90fb2ad2504a35603a33b15dc..2b6837ef2b57204b7bf4fd5c4373283892999268:/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb?ds=sidebyside diff --git a/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb b/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb index 17c5c4b889..f365a7fee8 100644 --- a/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb +++ b/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb @@ -2,6 +2,7 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController accept_attribute_as_json :scopes, Array before_filter :current_api_client_is_trusted before_filter :admin_required, :only => :create_system_auth + skip_before_filter :render_404_if_no_object, :only => :create_system_auth def self._create_system_auth_requires_parameters { @@ -10,39 +11,66 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController } end def create_system_auth - api_client_auth = ApiClientAuthorization. + @object = ApiClientAuthorization. new(user_id: system_user.id, api_client_id: params[:api_client_id] || current_api_client.andand.id, created_by_ip_address: remote_ip, scopes: Oj.load(params[:scopes] || '["all"]')) - api_client_auth.save! - render :json => api_client_auth.as_api_response(:superuser) + @object.save! + show end def create + # Note: the user could specify a owner_uuid for a different user, which on + # the surface appears to be a security hole. However, the record will be + # rejected before being saved to the database by the ApiClientAuthorization + # model which enforces that user_id == current user or the user is an + # admin. + if resource_attrs[:owner_uuid] # The model has an owner_id attribute instead of owner_uuid, but # we can't expect the client to know the local numeric ID. We # translate UUID to numeric ID here. resource_attrs[:user_id] = User.where(uuid: resource_attrs.delete(:owner_uuid)).first.andand.id + elsif not resource_attrs[:user_id] + resource_attrs[:user_id] = current_user.id end + resource_attrs[:api_client_id] = Thread.current[:api_client].id super end protected + def default_orders + ["#{table_name}.created_at desc"] + end + def find_objects_for_index # Here we are deliberately less helpful about searching for client - # authorizations. Rather than use the generic index/where/order - # features, we look up tokens belonging to the current user and - # filter by exact match on api_token (which we expect in the form - # of a where[uuid] parameter to make things easier for API client - # libraries). + # authorizations. We look up tokens belonging to the current user + # and filter by exact matches on api_token and scopes. + wanted_scopes = [] + if @filters + wanted_scopes.concat(@filters.map { |attr, operator, operand| + ((attr == 'scopes') and (operator == '=')) ? operand : nil + }) + @filters.select! { |attr, operator, operand| + (attr == 'uuid') and (operator == '=') + } + end + if @where + wanted_scopes << @where['scopes'] + @where.select! { |attr, val| attr == 'uuid' } + end @objects = model_class. includes(:user, :api_client). - where('user_id=? and (? or api_token=?)', current_user.id, !@where['uuid'], @where['uuid']). - order('created_at desc') + where('user_id=?', current_user.id) + super + wanted_scopes.compact.each do |scope_list| + sorted_scopes = scope_list.sort + @objects = @objects.select { |auth| auth.scopes.sort == sorted_scopes } + end end def find_object_by_uuid @@ -54,7 +82,8 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController def current_api_client_is_trusted unless Thread.current[:api_client].andand.is_trusted - render :json => { errors: ['Forbidden: this API client cannot manipulate other clients\' access tokens.'] }.to_json, status: 403 + send_error('Forbidden: this API client cannot manipulate other clients\' access tokens.', + status: 403) end end end