X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/856b9bb8403383347f771badb98a9093e1bb3aca..e3c25b992f96b34810c371aa75e30ba8ce40a639:/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb diff --git a/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb b/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb index 826ced1cf8..da7e11cd9f 100644 --- a/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb +++ b/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb @@ -6,10 +6,10 @@ require 'safe_json' class Arvados::V1::ApiClientAuthorizationsController < ApplicationController accept_attribute_as_json :scopes, Array - before_filter :current_api_client_is_trusted, :except => [:current] - before_filter :admin_required, :only => :create_system_auth - skip_before_filter :render_404_if_no_object, :only => [:create_system_auth, :current] - skip_before_filter :find_object_by_uuid, :only => [:create_system_auth, :current] + before_action :current_api_client_is_trusted, :except => [:current] + before_action :admin_required, :only => :create_system_auth + skip_before_action :render_404_if_no_object, :only => [:create_system_auth, :current] + skip_before_action :find_object_by_uuid, :only => [:create_system_auth, :current] def self._create_system_auth_requires_parameters { @@ -17,6 +17,7 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController scopes: {type: 'array', required: false} } end + def create_system_auth @object = ApiClientAuthorization. new(user_id: system_user.id, @@ -48,7 +49,12 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController end def current - @object = Thread.current[:api_client_authorization] + @object = Thread.current[:api_client_authorization].dup + if params[:remote] + # Client is validating a salted token. Don't return the unsalted + # secret! + @object.api_token = nil + end show end @@ -81,7 +87,9 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController val.is_a?(String) && (attr == 'uuid' || attr == 'api_token') } end - @objects = model_class.where('user_id=?', current_user.id) + if current_api_client_authorization.andand.api_token != Rails.configuration.SystemRootToken + @objects = model_class.where('user_id=?', current_user.id) + end if wanted_scopes.compact.any? # We can't filter on scopes effectively using AR/postgres. # Instead we get the entire result set, do our own filtering on @@ -120,10 +128,10 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController super end - def find_object_by_uuid + def find_object_by_uuid(with_lock: false) uuid_param = params[:uuid] || params[:id] - if (uuid_param != current_api_client_authorization.andand.uuid and - not Thread.current[:api_client].andand.is_trusted) + if (uuid_param != current_api_client_authorization.andand.uuid && + !Thread.current[:api_client].andand.is_trusted) return forbidden end @limit = 1 @@ -132,7 +140,11 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController @where = {} @filters = [['uuid', '=', uuid_param]] find_objects_for_index - @object = @objects.first + query = @objects + if with_lock && Rails.configuration.API.LockBeforeUpdate + query = query.lock + end + @object = query.first end def current_api_client_is_trusted