X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/dca6cfe9750d8d1be4f3b63895b8cb73cc6c4cfe..47530892a8a6b174786316c3881e22dc0864c859:/apps/workbench/app/controllers/users_controller.rb?ds=sidebyside diff --git a/apps/workbench/app/controllers/users_controller.rb b/apps/workbench/app/controllers/users_controller.rb index 5cfa48710f..9f8f60907f 100644 --- a/apps/workbench/app/controllers/users_controller.rb +++ b/apps/workbench/app/controllers/users_controller.rb @@ -1,18 +1,41 @@ class UsersController < ApplicationController - skip_before_filter :find_object_by_uuid, :only => [:welcome, :activity, :storage] - skip_around_filter :thread_with_mandatory_api_token, :only => :welcome + skip_around_filter :require_thread_api_token, only: :welcome + skip_before_filter :check_user_agreements, only: [:welcome, :inactive] + skip_before_filter :check_user_profile, only: [:welcome, :inactive, :profile] + skip_before_filter :find_object_by_uuid, only: [:welcome, :activity, :storage] before_filter :ensure_current_user_is_admin, only: [:sudo, :unsetup, :setup] + def show + if params[:uuid] == current_user.uuid + respond_to do |f| + f.html do + redirect_to(params[:return_to] || project_path(params[:uuid])) + end + end + else + super + end + end + def welcome if current_user - params[:action] = 'home' - home + redirect_to (params[:return_to] || '/') + end + end + + def inactive + if current_user.andand.is_invited + redirect_to (params[:return_to] || '/') end end + def profile + params[:offer_return_to] ||= params[:return_to] + end + def activity @breadcrumb_page_name = nil - @users = User.limit(params[:limit] || 1000).all + @users = User.limit(params[:limit]).all @user_activity = {} @activity = { logins: {}, @@ -65,7 +88,7 @@ class UsersController < ApplicationController def storage @breadcrumb_page_name = nil - @users = User.limit(params[:limit] || 1000).all + @users = User.limit(params[:limit]).all @user_storage = {} total_storage = {} @log_date = {} @@ -74,7 +97,7 @@ class UsersController < ApplicationController storage_log = Log. filter([[:object_uuid, '=', u.uuid], [:event_type, '=', 'user-storage-report']]). - order(['created_at desc']). + order(:created_at => :desc). limit(1) storage_log.each do |log_entry| # We expect this block to only execute once since we specified limit(1) @@ -107,11 +130,11 @@ class UsersController < ApplicationController end def sudo - resp = $arvados_api_client.api(ApiClientAuthorization, '', { - api_client_authorization: { - owner_uuid: @object.uuid - } - }) + resp = arvados_api_client.api(ApiClientAuthorization, '', { + api_client_authorization: { + owner_uuid: @object.uuid + } + }) redirect_to root_url(api_token: resp[:api_token]) end @@ -122,12 +145,12 @@ class UsersController < ApplicationController @my_jobs = Job. limit(10). - order(['created_at desc']). + order('created_at desc'). where(created_by: current_user.uuid) @my_collections = Collection. limit(10). - order(['created_at desc']). + order('created_at desc'). where(created_by: current_user.uuid) collection_uuids = @my_collections.collect &:uuid @@ -136,7 +159,7 @@ class UsersController < ApplicationController @persist_state[uuid] = 'cache' end - Link.limit(1000).filter([['head_uuid', 'in', collection_uuids], + Link.filter([['head_uuid', 'in', collection_uuids], ['link_class', 'in', ['tag', 'resources']]]). each do |link| case link.link_class @@ -151,7 +174,7 @@ class UsersController < ApplicationController @my_pipelines = PipelineInstance. limit(10). - order(['created_at desc']). + order('created_at desc'). where(created_by: current_user.uuid) respond_to do |f| @@ -211,6 +234,75 @@ class UsersController < ApplicationController end end + def manage_account + # repositories current user can read / write + repo_links = Link. + filter([['head_uuid', 'is_a', 'arvados#repository'], + ['tail_uuid', '=', current_user.uuid], + ['link_class', '=', 'permission'], + ]) + @my_repositories = Repository.where uuid: repo_links.collect(&:head_uuid) + @repo_writable = {} + repo_links.each do |link| + if link.name.in? ['can_write', 'can_manage'] + @repo_writable[link.head_uuid] = true + end + end + + # virtual machines the current user can login into + @my_vm_logins = {} + Link.where(tail_uuid: current_user.uuid, + link_class: 'permission', + name: 'can_login'). + each do |perm_link| + if perm_link.properties.andand[:username] + @my_vm_logins[perm_link.head_uuid] ||= [] + @my_vm_logins[perm_link.head_uuid] << perm_link.properties[:username] + end + end + @my_virtual_machines = VirtualMachine.where(uuid: @my_vm_logins.keys) + + # current user's ssh keys + @my_ssh_keys = AuthorizedKey.where(key_type: 'SSH', owner_uuid: current_user.uuid) + + respond_to do |f| + f.html { render template: 'users/manage_account' } + end + end + + def add_ssh_key_popup + respond_to do |format| + format.html + format.js + end + end + + def add_ssh_key + respond_to do |format| + key_params = {'key_type' => 'SSH'} + key_params['authorized_user_uuid'] = current_user.uuid + + if params['name'] && params['name'].size>0 + key_params['name'] = params['name'].strip + end + if params['public_key'] && params['public_key'].size>0 + key_params['public_key'] = params['public_key'].strip + end + + if !key_params['name'] && params['public_key'].andand.size>0 + split_key = key_params['public_key'].split + key_params['name'] = split_key[-1] if (split_key.size == 3) + end + + new_key = AuthorizedKey.create! key_params + if new_key + format.js + else + self.render_error status: 422 + end + end + end + protected def find_current_links user