X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/d07a96a0f0c11b98ecc927f0b3e0b052f8ef99f7..5b2ebfe3b248790efbce3206b693dd93f369ea4e:/services/api/app/middlewares/arvados_api_token.rb diff --git a/services/api/app/middlewares/arvados_api_token.rb b/services/api/app/middlewares/arvados_api_token.rb index fac1916abd..6a37631827 100644 --- a/services/api/app/middlewares/arvados_api_token.rb +++ b/services/api/app/middlewares/arvados_api_token.rb @@ -1,10 +1,23 @@ +# Copyright (C) The Arvados Authors. All rights reserved. +# +# SPDX-License-Identifier: AGPL-3.0 + +# Perform api_token checking very early in the request process. We want to do +# this in the Rack stack instead of in ApplicationController because +# websockets needs access to authentication but doesn't use any of the rails +# active dispatch infrastructure. class ArvadosApiToken + + # Create a new ArvadosApiToken handler + # +app+ The next layer of the Rack stack. def initialize(app = nil, options = nil) - @app = app if app.respond_to?(:call) + @app = app.respond_to?(:call) ? app : nil end def call env - # first, clean up just in case + # First, clean up just in case we have a multithreaded server and thread + # local variables are still set from a prior request. Also useful for + # tests that call this code to set up the environment. Thread.current[:api_client_ip_address] = nil Thread.current[:api_client_authorization] = nil Thread.current[:api_client_uuid] = nil @@ -19,21 +32,33 @@ class ArvadosApiToken user = nil api_client = nil api_client_auth = nil - supplied_token = - params["api_token"] || - params["oauth_token"] || - env["HTTP_AUTHORIZATION"].andand.match(/OAuth2 ([a-z0-9]+)/).andand[1] - if supplied_token - api_client_auth = ApiClientAuthorization. + if request.get? || params["_method"] == 'GET' + reader_tokens = params["reader_tokens"] + if reader_tokens.is_a? String + reader_tokens = SafeJSON.load(reader_tokens) + end + else + reader_tokens = nil + end + + # Set current_user etc. based on the primary session token if a + # valid one is present. Otherwise, use the first valid token in + # reader_tokens. + [params["api_token"], + params["oauth_token"], + env["HTTP_AUTHORIZATION"].andand.match(/OAuth2 ([a-zA-Z0-9]+)/).andand[1], + *reader_tokens, + ].each do |supplied| + next if !supplied + try_auth = ApiClientAuthorization. includes(:api_client, :user). - where('api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)', supplied_token). + where('api_token=? and (expires_at is null or expires_at > CURRENT_TIMESTAMP)', supplied). first - if api_client_auth.andand.user + if try_auth.andand.user + api_client_auth = try_auth user = api_client_auth.user api_client = api_client_auth.api_client - else - # Token seems valid, but points to a non-existent (deleted?) user. - api_client_auth = nil + break end end Thread.current[:api_client_ip_address] = remote_ip @@ -41,12 +66,7 @@ class ArvadosApiToken Thread.current[:api_client_uuid] = api_client.andand.uuid Thread.current[:api_client] = api_client Thread.current[:user] = user - if api_client_auth - api_client_auth.last_used_at = Time.now - api_client_auth.last_used_by_ip_address = remote_ip.to_s - api_client_auth.save validate: false - end - @app.call env + @app.call env if @app end end