X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/b9e5c8b32858338850da3e12ce27570b828898b3..d62abcbe1fe0fcf0ce65cb7ea812db307b734a45:/services/api/app/middlewares/arvados_api_token.rb diff --git a/services/api/app/middlewares/arvados_api_token.rb b/services/api/app/middlewares/arvados_api_token.rb index 2487f2ecb7..105b00faa4 100644 --- a/services/api/app/middlewares/arvados_api_token.rb +++ b/services/api/app/middlewares/arvados_api_token.rb @@ -1,3 +1,7 @@ +# Copyright (C) The Arvados Authors. All rights reserved. +# +# SPDX-License-Identifier: AGPL-3.0 + # Perform api_token checking very early in the request process. We want to do # this in the Rack stack instead of in ApplicationController because # websockets needs access to authentication but doesn't use any of the rails @@ -11,50 +15,36 @@ class ArvadosApiToken end def call env - # First, clean up just in case we have a multithreaded server and thread - # local variables are still set from a prior request. Also useful for - # tests that call this code to set up the environment. - Thread.current[:api_client_ip_address] = nil - Thread.current[:api_client_authorization] = nil - Thread.current[:api_client_uuid] = nil - Thread.current[:api_client] = nil - Thread.current[:user] = nil - request = Rack::Request.new(env) params = request.params remote_ip = env["action_dispatch.remote_ip"] Thread.current[:request_starttime] = Time.now - user = nil - api_client = nil - api_client_auth = nil - supplied_token = + Thread.current[:supplied_token] = params["api_token"] || params["oauth_token"] || - env["HTTP_AUTHORIZATION"].andand.match(/OAuth2 ([a-zA-Z0-9]+)/).andand[1] - if supplied_token - api_client_auth = ApiClientAuthorization. - includes(:api_client, :user). - where('api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)', supplied_token). - first - if api_client_auth.andand.user - user = api_client_auth.user - api_client = api_client_auth.api_client - else - # Token seems valid, but points to a non-existent (deleted?) user. - api_client_auth = nil - end + env["HTTP_AUTHORIZATION"].andand. + match(/(OAuth2|Bearer) ([-\/a-zA-Z0-9]+)/).andand[2] + + if params[:remote] && request.get? && ( + request.path.start_with?('/arvados/v1/groups') || + request.path.start_with?('/arvados/v1/users/current')) + # Request from a remote API server, asking to validate a salted + # token. + remote = params[:remote] + else + # Normal request. + remote = false end + auth = ApiClientAuthorization. + validate(token: Thread.current[:supplied_token], + remote: remote) + Thread.current[:api_client_ip_address] = remote_ip - Thread.current[:api_client_authorization] = api_client_auth - Thread.current[:api_client_uuid] = api_client.andand.uuid - Thread.current[:api_client] = api_client - Thread.current[:user] = user - if api_client_auth - api_client_auth.last_used_at = Time.now - api_client_auth.last_used_by_ip_address = remote_ip.to_s - api_client_auth.save validate: false - end + Thread.current[:api_client_authorization] = auth + Thread.current[:api_client_uuid] = auth.andand.api_client.andand.uuid + Thread.current[:api_client] = auth.andand.api_client + Thread.current[:user] = auth.andand.user @app.call env if @app end