X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/bd6b334c80cea328a51a8612d40ef16bdd6ab2e2..8f987a9271eda80697b3a8fc53e7ebb0f93816f9:/services/api/app/middlewares/arvados_api_token.rb diff --git a/services/api/app/middlewares/arvados_api_token.rb b/services/api/app/middlewares/arvados_api_token.rb index 2487f2ecb7..4098fd72ca 100644 --- a/services/api/app/middlewares/arvados_api_token.rb +++ b/services/api/app/middlewares/arvados_api_token.rb @@ -1,3 +1,7 @@ +# Copyright (C) The Arvados Authors. All rights reserved. +# +# SPDX-License-Identifier: AGPL-3.0 + # Perform api_token checking very early in the request process. We want to do # this in the Rack stack instead of in ApplicationController because # websockets needs access to authentication but doesn't use any of the rails @@ -11,51 +15,51 @@ class ArvadosApiToken end def call env - # First, clean up just in case we have a multithreaded server and thread - # local variables are still set from a prior request. Also useful for - # tests that call this code to set up the environment. - Thread.current[:api_client_ip_address] = nil - Thread.current[:api_client_authorization] = nil - Thread.current[:api_client_uuid] = nil - Thread.current[:api_client] = nil - Thread.current[:user] = nil - request = Rack::Request.new(env) params = request.params remote_ip = env["action_dispatch.remote_ip"] Thread.current[:request_starttime] = Time.now - user = nil - api_client = nil - api_client_auth = nil - supplied_token = - params["api_token"] || - params["oauth_token"] || - env["HTTP_AUTHORIZATION"].andand.match(/OAuth2 ([a-zA-Z0-9]+)/).andand[1] - if supplied_token - api_client_auth = ApiClientAuthorization. - includes(:api_client, :user). - where('api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)', supplied_token). - first - if api_client_auth.andand.user - user = api_client_auth.user - api_client = api_client_auth.api_client - else - # Token seems valid, but points to a non-existent (deleted?) user. - api_client_auth = nil + + remote = false + reader_tokens = nil + if params["remote"] && request.get? && ( + request.path.start_with?('/arvados/v1/groups') || + request.path.start_with?('/arvados/v1/users/current')) + # Request from a remote API server, asking to validate a salted + # token. + remote = params["remote"] + elsif request.get? || params["_method"] == 'GET' + reader_tokens = params["reader_tokens"] + if reader_tokens.is_a? String + reader_tokens = SafeJSON.load(reader_tokens) end end - Thread.current[:api_client_ip_address] = remote_ip - Thread.current[:api_client_authorization] = api_client_auth - Thread.current[:api_client_uuid] = api_client.andand.uuid - Thread.current[:api_client] = api_client - Thread.current[:user] = user - if api_client_auth - api_client_auth.last_used_at = Time.now - api_client_auth.last_used_by_ip_address = remote_ip.to_s - api_client_auth.save validate: false + + # Set current_user etc. based on the primary session token if a + # valid one is present. Otherwise, use the first valid token in + # reader_tokens. + auth = nil + [params["api_token"], + params["oauth_token"], + env["HTTP_AUTHORIZATION"].andand.match(/(OAuth2|Bearer) ([-\/a-zA-Z0-9]+)/).andand[2], + *reader_tokens, + ].each do |supplied| + next if !supplied + try_auth = ApiClientAuthorization. + validate(token: supplied, remote: remote) + if try_auth.andand.user + auth = try_auth + break + end end + Thread.current[:api_client_ip_address] = remote_ip + Thread.current[:api_client_authorization] = auth + Thread.current[:api_client_uuid] = auth.andand.api_client.andand.uuid + Thread.current[:api_client] = auth.andand.api_client + Thread.current[:user] = auth.andand.user + @app.call env if @app end end