X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/6f6235983d91e0b9fb5660d0a2825f510bbdac73..2f13152e6e81dada55b7e14f9cd981156d60d561:/apps/workbench/app/controllers/users_controller.rb diff --git a/apps/workbench/app/controllers/users_controller.rb b/apps/workbench/app/controllers/users_controller.rb index 3d8c8530ad..8c2a68082b 100644 --- a/apps/workbench/app/controllers/users_controller.rb +++ b/apps/workbench/app/controllers/users_controller.rb @@ -1,6 +1,5 @@ class UsersController < ApplicationController skip_before_filter :find_object_by_uuid, :only => [:welcome, :activity, :storage] - skip_around_filter :thread_with_mandatory_api_token, :only => :welcome before_filter :ensure_current_user_is_admin, only: [:sudo, :unsetup, :setup] def welcome @@ -211,6 +210,39 @@ class UsersController < ApplicationController end end + def manage_account + # repositories current user can read / write + repo_links = [] + Link.where(tail_uuid: current_user.uuid, + link_class: 'permission', + name: ['can_write', 'can_read']). + each do |perm_link| + repo_links << perm_link[:head_uuid] + end + @my_repositories = Repository.where(uuid: repo_links) + + # virtual machines the current user can login into + @my_vm_logins = {} + Link.where(tail_uuid: current_user.uuid, + link_class: 'permission', + name: 'can_login'). + each do |perm_link| + if perm_link.properties.andand[:username] + @my_vm_logins[perm_link.head_uuid] ||= [] + @my_vm_logins[perm_link.head_uuid] << perm_link.properties[:username] + end + end + @my_virtual_machines = VirtualMachine.where(uuid: @my_vm_logins.keys) + + # current user's ssh keys + @my_ssh_keys = AuthorizedKey.where(key_type: 'SSH', owner_uuid: current_user.uuid) + + respond_to do |f| +# f.js { render template: 'users/manage_account.js' } + f.html { render template: 'users/manage_account' } + end + end + protected def find_current_links user