X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/f2574ec2e4ddef03c9504cd58741e73426ea1b17..cf1097ef1225c05eb4431093a4971739a3ee5a37:/apps/workbench/app/controllers/collections_controller.rb diff --git a/apps/workbench/app/controllers/collections_controller.rb b/apps/workbench/app/controllers/collections_controller.rb index 7ef85a5cfc..4e0008d93c 100644 --- a/apps/workbench/app/controllers/collections_controller.rb +++ b/apps/workbench/app/controllers/collections_controller.rb @@ -1,10 +1,18 @@ class CollectionsController < ApplicationController - skip_around_filter :thread_with_mandatory_api_token, only: [:show_file] - skip_before_filter :find_object_by_uuid, only: [:provenance, :show_file] - skip_before_filter :check_user_agreements, only: [:show_file] + include ActionController::Live + + skip_around_filter(:require_thread_api_token, + only: [:show_file, :show_file_links]) + skip_before_filter(:find_object_by_uuid, + only: [:provenance, :show_file, :show_file_links]) + # We depend on show_file to display the user agreement: + skip_before_filter :check_user_agreements, only: :show_file + skip_before_filter :check_user_profile, only: :show_file + + RELATION_LIMIT = 5 def show_pane_list - %w(Files Attributes Metadata Provenance_graph Used_by JSON API) + %w(Files Provenance_graph Used_by Advanced) end def set_persistent @@ -37,11 +45,43 @@ class CollectionsController < ApplicationController end end + def choose + # Find collections using default find_objects logic, then search for name + # links, and preload any other links connected to the collections that are + # found. + # Name links will be obsolete when issue #3036 is merged, + # at which point this entire custom #choose function can probably be + # eliminated. + + params[:limit] ||= 40 + + find_objects_for_index + @collections = @objects + + @filters += [['link_class','=','name'], + ['head_uuid','is_a','arvados#collection']] + + @objects = Link + find_objects_for_index + + @name_links = @objects + + @objects = Collection. + filter([['uuid','in',@name_links.collect(&:head_uuid)]]) + + preload_links_for_objects (@collections.to_a + @objects.to_a) + super + end + def index + # API server index doesn't return manifest_text by default, but our + # callers want it unless otherwise specified. + @select ||= Collection.columns.map(&:name) + base_search = Collection.select(@select) if params[:search].andand.length.andand > 0 tags = Link.where(any: ['contains', params[:search]]) - @collections = (Collection.where(uuid: tags.collect(&:head_uuid)) | - Collection.where(any: ['contains', params[:search]])). + @collections = (base_search.where(uuid: tags.collect(&:head_uuid)) | + base_search.where(any: ['contains', params[:search]])). uniq { |c| c.uuid } else if params[:limit] @@ -56,7 +96,7 @@ class CollectionsController < ApplicationController offset = 0 end - @collections = Collection.limit(limit).offset(offset) + @collections = base_search.limit(limit).offset(offset) end @links = Link.limit(1000). where(head_uuid: @collections.collect(&:uuid)) @@ -85,6 +125,14 @@ class CollectionsController < ApplicationController info[:links] << link end @request_url = request.url + + render_index + end + + def show_file_links + Thread.current[:reader_tokens] = [params[:reader_token]] + return if false.equal?(find_object_by_uuid) + render layout: false end def show_file @@ -93,110 +141,168 @@ class CollectionsController < ApplicationController # purposes: it lets us return a useful status code for common errors, and # helps us figure out which token to provide to arv-get. coll = nil - usable_token = find_usable_token do + tokens = [Thread.current[:arvados_api_token], params[:reader_token]].compact + usable_token = find_usable_token(tokens) do coll = Collection.find(params[:uuid]) end if usable_token.nil? return # Response already rendered. - elsif params[:file].nil? or not file_in_collection?(coll, params[:file]) + elsif params[:file].nil? or not coll.manifest.has_file?(params[:file]) return render_not_found end + opts = params.merge(arvados_api_token: usable_token) + + # Handle Range requests. Currently we support only 'bytes=0-....' + if request.headers.include? 'HTTP_RANGE' + if m = /^bytes=0-(\d+)/.match(request.headers['HTTP_RANGE']) + opts[:maxbytes] = m[1] + size = params[:size] || '*' + self.response.status = 206 + self.response.headers['Content-Range'] = "bytes 0-#{m[1]}/#{size}" + end + end + ext = File.extname(params[:file]) self.response.headers['Content-Type'] = Rack::Mime::MIME_TYPES[ext] || 'application/octet-stream' - self.response.headers['Content-Length'] = params[:size] if params[:size] + if params[:size] + size = params[:size].to_i + if opts[:maxbytes] + size = [size, opts[:maxbytes].to_i].min + end + self.response.headers['Content-Length'] = size.to_s + end self.response.headers['Content-Disposition'] = params[:disposition] if params[:disposition] - self.response_body = file_enumerator opts + begin + file_enumerator(opts).each do |bytes| + response.stream.write bytes + end + ensure + response.stream.close + end + end + + def sharing_scopes + ["GET /arvados/v1/collections/#{@object.uuid}", "GET /arvados/v1/collections/#{@object.uuid}/", "GET /arvados/v1/keep_services/accessible"] + end + + def search_scopes + begin + ApiClientAuthorization.filter([['scopes', '=', sharing_scopes]]).results + rescue ArvadosApiClient::AccessForbiddenException + nil + end + end + + def find_object_by_uuid + if not Keep::Locator.parse params[:id] + super + end end def show return super if !@object - @provenance = [] - @output2job = {} - @output2colorindex = {} - @sourcedata = {params[:uuid] => {uuid: params[:uuid]}} - @protected = {} - - colorindex = -1 - any_hope_left = true - while any_hope_left - any_hope_left = false - Job.where(output: @sourcedata.keys).sort_by { |a| a.finished_at || a.created_at }.reverse.each do |job| - if !@output2colorindex[job.output] - any_hope_left = true - @output2colorindex[job.output] = (colorindex += 1) % 10 - @provenance << {job: job, output: job.output} - @sourcedata.delete job.output - @output2job[job.output] = job - job.dependencies.each do |new_source_data| - unless @output2colorindex[new_source_data] - @sourcedata[new_source_data] = {uuid: new_source_data} - end - end + if current_user + if Keep::Locator.parse params["uuid"] + @same_pdh = Collection.filter([["portable_data_hash", "=", @object.portable_data_hash]]).limit(1000) + if @same_pdh.results.size == 1 + redirect_to collection_path(@same_pdh[0]["uuid"]) + return end - end - end + owners = @same_pdh.map(&:owner_uuid).to_a.uniq + preload_objects_for_dataclass Group, owners + preload_objects_for_dataclass User, owners + render 'hash_matches' + return + else + jobs_with = lambda do |conds| + Job.limit(RELATION_LIMIT).where(conds) + .results.sort_by { |j| j.finished_at || j.created_at } + end + @output_of = jobs_with.call(output: @object.portable_data_hash) + @log_of = jobs_with.call(log: @object.portable_data_hash) + @project_links = Link.limit(RELATION_LIMIT).order("modified_at DESC") + .where(head_uuid: @object.uuid, link_class: 'name').results + project_hash = Group.where(uuid: @project_links.map(&:tail_uuid)).to_hash + @projects = project_hash.values - Link.where(head_uuid: @sourcedata.keys | @output2job.keys).each do |link| - if link.link_class == 'resources' and link.name == 'wants' - @protected[link.head_uuid] = true - if link.tail_uuid == current_user.uuid - @is_persistent = true + @permissions = Link.limit(RELATION_LIMIT).order("modified_at DESC") + .where(head_uuid: @object.uuid, link_class: 'permission', + name: 'can_read').results + @logs = Log.limit(RELATION_LIMIT).order("created_at DESC") + .where(object_uuid: @object.uuid).results + @is_persistent = Link.limit(1) + .where(head_uuid: @object.uuid, tail_uuid: current_user.uuid, + link_class: 'resources', name: 'wants') + .results.any? + @search_sharing = search_scopes + + if params["tab_pane"] == "Provenance_graph" + @prov_svg = ProvenanceHelper::create_provenance_graph(@object.provenance, "provenance_svg", + {:request => request, + :direction => :bottom_up, + :combine_jobs => :script_only}) rescue nil + end + if params["tab_pane"] == "Used_by" + @used_by_svg = ProvenanceHelper::create_provenance_graph(@object.used_by, "used_by_svg", + {:request => request, + :direction => :top_down, + :combine_jobs => :script_only, + :pdata_only => true}) rescue nil end end end - Link.where(tail_uuid: @sourcedata.keys).each do |link| - if link.link_class == 'data_origin' - @sourcedata[link.tail_uuid][:data_origins] ||= [] - @sourcedata[link.tail_uuid][:data_origins] << [link.name, link.head_uuid] - end - end - Collection.where(uuid: @sourcedata.keys).each do |collection| - if @sourcedata[collection.uuid] - @sourcedata[collection.uuid][:collection] = collection - end + super + end + + def sharing_popup + @search_sharing = search_scopes + respond_to do |format| + format.html + format.js end + end + + helper_method :download_link + + def download_link + collections_url + "/download/#{@object.uuid}/#{@search_sharing.first.api_token}/" + end - Collection.where(uuid: @object.uuid).each do |u| - @prov_svg = ProvenanceHelper::create_provenance_graph(u.provenance, "provenance_svg", - {:request => request, - :direction => :bottom_up, - :combine_jobs => :script_only}) rescue nil - @used_by_svg = ProvenanceHelper::create_provenance_graph(u.used_by, "used_by_svg", - {:request => request, - :direction => :top_down, - :combine_jobs => :script_only, - :pdata_only => true}) rescue nil + def share + a = ApiClientAuthorization.create(scopes: sharing_scopes) + @search_sharing = search_scopes + render 'sharing_popup' + end + + def unshare + @search_sharing = search_scopes + @search_sharing.each do |s| + s.destroy end + @search_sharing = search_scopes + render 'sharing_popup' end protected - def find_usable_token - # Iterate over every token available to make it the current token and + def find_usable_token(token_list) + # Iterate over every given token to make it the current token and # yield the given block. # If the block succeeds, return the token it used. # Otherwise, render an error response based on the most specific # error we encounter, and return nil. - read_tokens = [Thread.current[:arvados_api_token]].compact - if params[:reader_tokens].is_a? Array - read_tokens += params[:reader_tokens] - end most_specific_error = [401] - read_tokens.each do |api_token| - using_specific_api_token(api_token) do - begin + token_list.each do |api_token| + begin + using_specific_api_token(api_token) do yield return api_token - rescue ArvadosApiClient::NotLoggedInException => error - status = 401 - rescue => error - status = (error.message =~ /\[API: (\d+)\]$/) ? $1.to_i : nil - raise unless [401, 403, 404].include?(status) end - if status >= most_specific_error.first - most_specific_error = [status, error] + rescue ArvadosApiClient::ApiError => error + if error.api_status >= most_specific_error.first + most_specific_error = [error.api_status, error] end end end @@ -209,44 +315,39 @@ class CollectionsController < ApplicationController return nil end - def file_in_collection?(collection, filename) - def normalized_path(part_list) - File.join(part_list).sub(%r{^\./}, '') - end - target = normalized_path([filename]) - collection.files.each do |file_spec| - return true if (normalized_path(file_spec[0, 2]) == target) - end - false - end - def file_enumerator(opts) FileStreamer.new opts end class FileStreamer + include ArvadosApiClientHelper def initialize(opts={}) @opts = opts end def each return unless @opts[:uuid] && @opts[:file] - env = Hash[ENV]. - merge({ - 'ARVADOS_API_HOST' => - arvados_api_client.arvados_v1_base. - sub(/\/arvados\/v1/, ''). - sub(/^https?:\/\//, ''), - 'ARVADOS_API_TOKEN' => - @opts[:arvados_api_token], - 'ARVADOS_API_HOST_INSECURE' => - Rails.configuration.arvados_insecure_https ? 'true' : 'false' - }) - IO.popen([env, 'arv-get', "#{@opts[:uuid]}/#{@opts[:file]}"], - 'rb') do |io| - while buf = io.read(2**20) - yield buf + + env = Hash[ENV].dup + + require 'uri' + u = URI.parse(arvados_api_client.arvados_v1_base) + env['ARVADOS_API_HOST'] = "#{u.host}:#{u.port}" + env['ARVADOS_API_TOKEN'] = @opts[:arvados_api_token] + env['ARVADOS_API_HOST_INSECURE'] = "true" if Rails.configuration.arvados_insecure_https + + bytesleft = @opts[:maxbytes].andand.to_i || 2**16 + io = IO.popen([env, 'arv-get', "#{@opts[:uuid]}/#{@opts[:file]}"], 'rb') + while bytesleft > 0 && (buf = io.read([bytesleft, 2**16].min)) != nil + # shrink the bytesleft count, if we were given a maximum byte + # count to read + if @opts.include? :maxbytes + bytesleft = bytesleft - buf.length end + yield buf end + io.close + # "If ios is opened by IO.popen, close sets $?." + # http://www.ruby-doc.org/core-2.1.3/IO.html#method-i-close Rails.logger.warn("#{@opts[:uuid]}/#{@opts[:file]}: #{$?}") if $? != 0 end end