X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/fd02589a3107d0fd02a26668c44ecbff7c729081..0f8dc3d824f03b82b8db9f61bbcc0592b62b998f:/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb diff --git a/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb b/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb index 8fd915ddfb..2eb79c090d 100644 --- a/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb +++ b/services/api/app/controllers/arvados/v1/api_client_authorizations_controller.rb @@ -21,12 +21,20 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController end def create + # Note: the user could specify a owner_uuid for a different user, which on + # the surface appears to be a security hole. However, the record will be + # rejected before being saved to the database by the ApiClientAuthorization + # model which enforces that user_id == current user or the user is an + # admin. + if resource_attrs[:owner_uuid] # The model has an owner_id attribute instead of owner_uuid, but # we can't expect the client to know the local numeric ID. We # translate UUID to numeric ID here. resource_attrs[:user_id] = User.where(uuid: resource_attrs.delete(:owner_uuid)).first.andand.id + elsif not resource_attrs[:user_id] + resource_attrs[:user_id] = current_user.id end resource_attrs[:api_client_id] = Thread.current[:api_client].id super @@ -34,29 +42,57 @@ class Arvados::V1::ApiClientAuthorizationsController < ApplicationController protected + def default_orders + ["#{table_name}.created_at desc"] + end + def find_objects_for_index # Here we are deliberately less helpful about searching for client - # authorizations. Rather than use the generic index/where/order - # features, we look up tokens belonging to the current user and - # filter by exact match on api_token (which we expect in the form - # of a where[uuid] parameter to make things easier for API client - # libraries). + # authorizations. We look up tokens belonging to the current user + # and filter by exact matches on api_token and scopes. + wanted_scopes = [] + if @filters + wanted_scopes.concat(@filters.map { |attr, operator, operand| + ((attr == 'scopes') and (operator == '=')) ? operand : nil + }) + @filters.select! { |attr, operator, operand| + ((attr == 'uuid') and (operator == '=')) || ((attr == 'api_token') and (operator == '=')) + } + end + if @where + wanted_scopes << @where['scopes'] + @where.select! { |attr, val| attr == 'uuid' } + end @objects = model_class. includes(:user, :api_client). - where('user_id=? and (? or api_token=?)', current_user.id, !@where['uuid'], @where['uuid']). - order('created_at desc') + where('user_id=?', current_user.id) + super + wanted_scopes.compact.each do |scope_list| + sorted_scopes = scope_list.sort + @objects = @objects.select { |auth| auth.scopes.sort == sorted_scopes } + end end def find_object_by_uuid - # Again, to make things easier for the client and our own routing, - # here we look for the api_token key in a "uuid" (POST) or "id" - # (GET) parameter. - @object = model_class.where('api_token=?', params[:uuid] || params[:id]).first + @object = model_class.where(uuid: (params[:uuid] || params[:id])).first end def current_api_client_is_trusted unless Thread.current[:api_client].andand.is_trusted - render :json => { errors: ['Forbidden: this API client cannot manipulate other clients\' access tokens.'] }.to_json, status: 403 + if params["action"] == "show" + if @object and @object['api_token'] == current_api_client_authorization.andand.api_token + return true + end + elsif params["action"] == "index" and @objects.andand.size == 1 + filters = @filters.map{|f|f.first}.uniq + if ['uuid'] == filters + return true if @objects.first['api_token'] == current_api_client_authorization.andand.api_token + elsif ['api_token'] == filters + return true if @objects.first[:user_id] = current_user.id + end + end + send_error('Forbidden: this API client cannot manipulate other clients\' access tokens.', + status: 403) end end end