X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/797d52120825122da27d003772d75c6b8903fa90..8d6c085a1a7f0a7895245949a250d11d15117cf9:/services/api/app/middlewares/arvados_api_token.rb diff --git a/services/api/app/middlewares/arvados_api_token.rb b/services/api/app/middlewares/arvados_api_token.rb index 5eb756b9fa..18140e57fe 100644 --- a/services/api/app/middlewares/arvados_api_token.rb +++ b/services/api/app/middlewares/arvados_api_token.rb @@ -15,46 +15,90 @@ class ArvadosApiToken end def call env - # First, clean up just in case we have a multithreaded server and thread - # local variables are still set from a prior request. Also useful for - # tests that call this code to set up the environment. - Thread.current[:api_client_ip_address] = nil - Thread.current[:api_client_authorization] = nil - Thread.current[:api_client_uuid] = nil - Thread.current[:api_client] = nil - Thread.current[:user] = nil - request = Rack::Request.new(env) params = request.params remote_ip = env["action_dispatch.remote_ip"] Thread.current[:request_starttime] = Time.now - user = nil - api_client = nil - api_client_auth = nil - supplied_token = - params["api_token"] || - params["oauth_token"] || - env["HTTP_AUTHORIZATION"].andand.match(/OAuth2 ([a-zA-Z0-9]+)/).andand[1] - if supplied_token - api_client_auth = ApiClientAuthorization. - includes(:api_client, :user). - where('api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)', supplied_token). - first - if api_client_auth.andand.user - user = api_client_auth.user - api_client = api_client_auth.api_client + + remote = false + reader_tokens = nil + if params["remote"] && request.get? && ( + request.path.start_with?('/arvados/v1/groups') || + request.path.start_with?('/arvados/v1/api_client_authorizations/current') || + request.path.start_with?('/arvados/v1/users/current')) + # Request from a remote API server, asking to validate a salted + # token. + remote = params["remote"] + elsif request.get? || params["_method"] == 'GET' + reader_tokens = params["reader_tokens"] + if reader_tokens.is_a? String + reader_tokens = SafeJSON.load(reader_tokens) + end + end + + # Set current_user etc. based on the primary session token if a + # valid one is present. Otherwise, use the first valid token in + # reader_tokens. + accepted = false + auth = nil + remote_errcodes = [] + remote_errmsgs = [] + [params["api_token"], + params["oauth_token"], + env["HTTP_AUTHORIZATION"].andand.match(/(OAuth2|Bearer) ([!-~]+)/).andand[2], + *reader_tokens, + ].each do |supplied| + next if !supplied + begin + try_auth = ApiClientAuthorization.validate(token: supplied, remote: remote) + rescue => e + begin + remote_errcodes.append(e.http_status) + rescue NoMethodError + # The exception is an internal validation problem, not a remote error. + next + end + begin + errors = SafeJSON.load(e.res.content)["errors"] + rescue + errors = nil + end + remote_errmsgs += errors if errors.is_a?(Array) else - # Token seems valid, but points to a non-existent (deleted?) user. - api_client_auth = nil + if try_auth.andand.user + auth = try_auth + accepted = supplied + break + end end end + Thread.current[:api_client_ip_address] = remote_ip - Thread.current[:api_client_authorization] = api_client_auth - Thread.current[:api_client_uuid] = api_client.andand.uuid - Thread.current[:api_client] = api_client - Thread.current[:user] = user + Thread.current[:api_client_authorization] = auth + Thread.current[:api_client_uuid] = auth.andand.api_client.andand.uuid + Thread.current[:api_client] = auth.andand.api_client + Thread.current[:token] = accepted + Thread.current[:user] = auth.andand.user - @app.call env if @app + if auth.nil? and not remote_errcodes.empty? + # If we failed to validate any tokens because of remote validation + # errors, pass those on to the client. This code is functionally very + # similar to ApplicationController#render_error, but the implementation + # is very different because we're a Rack middleware, not in + # ActionDispatch land yet. + remote_errmsgs.prepend("failed to validate remote token") + error_content = { + error_token: "%d+%08x" % [Time.now.utc.to_i, rand(16 ** 8)], + errors: remote_errmsgs, + } + [ + remote_errcodes.max, + {"Content-Type": "application/json"}, + SafeJSON.dump(error_content).html_safe, + ] + else + @app.call env if @app + end end end