X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/c7cb2008660e30725a73b8c3ce5034d904e758c1..ad25d712525293ce4f95f5a059b390036ec60dc3:/services/api/app/controllers/arvados/v1/users_controller.rb diff --git a/services/api/app/controllers/arvados/v1/users_controller.rb b/services/api/app/controllers/arvados/v1/users_controller.rb index f473b922a5..4a345f363b 100644 --- a/services/api/app/controllers/arvados/v1/users_controller.rb +++ b/services/api/app/controllers/arvados/v1/users_controller.rb @@ -5,11 +5,11 @@ class Arvados::V1::UsersController < ApplicationController accept_attribute_as_json :prefs, Hash - skip_before_filter :find_object_by_uuid, only: + skip_before_action :find_object_by_uuid, only: [:activate, :current, :system, :setup, :merge] - skip_before_filter :render_404_if_no_object, only: + skip_before_action :render_404_if_no_object, only: [:activate, :current, :system, :setup, :merge] - before_filter :admin_required, only: [:setup, :unsetup, :update_uuid] + before_action :admin_required, only: [:setup, :unsetup, :update_uuid] def current if current_user @@ -73,7 +73,7 @@ class Arvados::V1::UsersController < ApplicationController if !@object return render_404_if_no_object end - elsif !params[:user] + elsif !params[:user] || params[:user].empty? raise ArgumentError.new "Required uuid or user" elsif !params[:user]['email'] raise ArgumentError.new "Require user email" @@ -126,37 +126,65 @@ class Arvados::V1::UsersController < ApplicationController end def merge - if !Thread.current[:api_client].andand.is_trusted - return send_error("supplied API token is not from a trusted client", status: 403) - elsif Thread.current[:api_client_authorization].scopes != ['all'] - return send_error("cannot merge with a scoped token", status: 403) - end + if (params[:old_user_uuid] || params[:new_user_uuid]) + if !current_user.andand.is_admin + return send_error("Must be admin to use old_user_uuid/new_user_uuid", status: 403) + end + if !params[:old_user_uuid] || !params[:new_user_uuid] + return send_error("Must supply both old_user_uuid and new_user_uuid", status: 422) + end + new_user = User.find_by_uuid(params[:new_user_uuid]) + if !new_user + return send_error("User in new_user_uuid not found", status: 422) + end + @object = User.find_by_uuid(params[:old_user_uuid]) + if !@object + return send_error("User in old_user_uuid not found", status: 422) + end + else + if !Thread.current[:api_client].andand.is_trusted + return send_error("supplied API token is not from a trusted client", status: 403) + elsif Thread.current[:api_client_authorization].scopes != ['all'] + return send_error("cannot merge with a scoped token", status: 403) + end - new_auth = ApiClientAuthorization.validate(token: params[:new_user_token]) - if !new_auth - return send_error("invalid new_user_token", status: 401) - end - if !new_auth.api_client.andand.is_trusted - return send_error("supplied new_user_token is not from a trusted client", status: 403) - elsif new_auth.scopes != ['all'] - return send_error("supplied new_user_token has restricted scope", status: 403) + new_auth = ApiClientAuthorization.validate(token: params[:new_user_token]) + if !new_auth + return send_error("invalid new_user_token", status: 401) + end + + if new_auth.user.uuid[0..4] == Rails.configuration.ClusterID + if !new_auth.api_client.andand.is_trusted + return send_error("supplied new_user_token is not from a trusted client", status: 403) + elsif new_auth.scopes != ['all'] + return send_error("supplied new_user_token has restricted scope", status: 403) + end + end + new_user = new_auth.user + @object = current_user end - new_user = new_auth.user - if current_user.uuid == new_user.uuid + if @object.uuid == new_user.uuid return send_error("cannot merge user to self", status: 422) end + if !params[:new_owner_uuid] + return send_error("missing new_owner_uuid", status: 422) + end + if !new_user.can?(write: params[:new_owner_uuid]) return send_error("cannot move objects into supplied new_owner_uuid: new user does not have write permission", status: 403) end redirect = params[:redirect_to_new_user] + if @object.uuid[0..4] != Rails.configuration.ClusterID && redirect + return send_error("cannot merge remote user to other with redirect_to_new_user=true", status: 422) + end + if !redirect return send_error("merge with redirect_to_new_user=false is not yet supported", status: 422) end - @object = current_user act_as_system_user do @object.merge(new_owner_uuid: params[:new_owner_uuid], redirect_to_user_uuid: redirect && new_user.uuid) end @@ -165,6 +193,26 @@ class Arvados::V1::UsersController < ApplicationController protected + def self._merge_requires_parameters + { + new_owner_uuid: { + type: 'string', required: true, + }, + new_user_token: { + type: 'string', required: false, + }, + redirect_to_new_user: { + type: 'boolean', required: false, + }, + old_user_uuid: { + type: 'string', required: false, + }, + new_user_uuid: { + type: 'string', required: false, + } + } + end + def self._setup_requires_parameters { user: {