2019-05-02 18:17:27 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2013-10-22 15:53:08 -04:00
|
|
|
class ApiKey < ActiveRecord::Base
|
2019-12-12 06:45:00 -05:00
|
|
|
class KeyAccessError < StandardError; end
|
|
|
|
|
2020-07-16 14:51:24 -04:00
|
|
|
has_many :api_key_scopes
|
2013-10-22 15:53:08 -04:00
|
|
|
belongs_to :user
|
2017-08-31 00:06:56 -04:00
|
|
|
belongs_to :created_by, class_name: 'User'
|
2013-10-22 15:53:08 -04:00
|
|
|
|
2019-11-05 09:10:23 -05:00
|
|
|
scope :active, -> { where("revoked_at IS NULL") }
|
|
|
|
scope :revoked, -> { where("revoked_at IS NOT NULL") }
|
|
|
|
|
2019-12-12 06:45:00 -05:00
|
|
|
scope :with_key, ->(key) {
|
|
|
|
hashed = self.hash_key(key)
|
|
|
|
where(key_hash: hashed)
|
|
|
|
}
|
2013-10-22 15:53:08 -04:00
|
|
|
|
2019-11-05 09:10:23 -05:00
|
|
|
after_initialize :generate_key
|
|
|
|
|
|
|
|
def generate_key
|
2019-12-12 06:45:00 -05:00
|
|
|
if !self.key_hash
|
|
|
|
@key ||= SecureRandom.hex(32) # Not saved to DB
|
|
|
|
self.truncated_key = key[0..3]
|
|
|
|
self.key_hash = ApiKey.hash_key(key)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def key
|
|
|
|
raise KeyAccessError.new "API key is only accessible immediately after creation" unless key_available?
|
|
|
|
@key
|
2013-10-22 15:53:08 -04:00
|
|
|
end
|
|
|
|
|
2019-12-12 06:45:00 -05:00
|
|
|
def key_available?
|
|
|
|
@key.present?
|
2019-11-05 09:10:23 -05:00
|
|
|
end
|
|
|
|
|
|
|
|
def self.last_used_epoch
|
|
|
|
SiteSetting.api_key_last_used_epoch.presence
|
2013-10-22 15:53:08 -04:00
|
|
|
end
|
|
|
|
|
2019-11-05 09:10:23 -05:00
|
|
|
def self.revoke_unused_keys!
|
|
|
|
return if SiteSetting.revoke_api_keys_days == 0 # Never expire keys
|
|
|
|
to_revoke = active.where("GREATEST(last_used_at, created_at, updated_at, :epoch) < :threshold",
|
|
|
|
epoch: last_used_epoch,
|
|
|
|
threshold: SiteSetting.revoke_api_keys_days.days.ago
|
|
|
|
)
|
|
|
|
|
|
|
|
to_revoke.find_each do |api_key|
|
|
|
|
ApiKey.transaction do
|
|
|
|
api_key.update!(revoked_at: Time.zone.now)
|
|
|
|
|
|
|
|
StaffActionLogger.new(Discourse.system_user).log_api_key(
|
|
|
|
api_key,
|
|
|
|
UserHistory.actions[:api_key_update],
|
|
|
|
changes: api_key.saved_changes,
|
|
|
|
context: I18n.t("staff_action_logs.api_key.automatic_revoked", count: SiteSetting.revoke_api_keys_days))
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2019-12-12 06:45:00 -05:00
|
|
|
|
|
|
|
def self.hash_key(key)
|
|
|
|
Digest::SHA256.hexdigest key
|
|
|
|
end
|
2020-07-16 14:51:24 -04:00
|
|
|
|
|
|
|
def request_allowed?(request, route_param)
|
|
|
|
return false if allowed_ips.present? && allowed_ips.none? { |ip| ip.include?(request.ip) }
|
|
|
|
|
|
|
|
api_key_scopes.blank? || api_key_scopes.any? { |s| s.permits?(route_param) }
|
|
|
|
end
|
2013-10-22 15:53:08 -04:00
|
|
|
end
|
2013-12-05 01:40:35 -05:00
|
|
|
|
|
|
|
# == Schema Information
|
|
|
|
#
|
|
|
|
# Table name: api_keys
|
|
|
|
#
|
|
|
|
# id :integer not null, primary key
|
|
|
|
# user_id :integer
|
|
|
|
# created_by_id :integer
|
2014-08-27 01:19:25 -04:00
|
|
|
# created_at :datetime not null
|
|
|
|
# updated_at :datetime not null
|
2014-11-19 22:53:15 -05:00
|
|
|
# allowed_ips :inet is an Array
|
2014-12-24 04:11:41 -05:00
|
|
|
# hidden :boolean default(FALSE), not null
|
2019-09-03 04:10:29 -04:00
|
|
|
# last_used_at :datetime
|
2019-11-19 05:20:14 -05:00
|
|
|
# revoked_at :datetime
|
|
|
|
# description :text
|
2019-12-12 06:45:00 -05:00
|
|
|
# key_hash :string not null
|
|
|
|
# truncated_key :string not null
|
2013-12-05 01:40:35 -05:00
|
|
|
#
|
|
|
|
# Indexes
|
|
|
|
#
|
2019-12-12 06:45:00 -05:00
|
|
|
# index_api_keys_on_key_hash (key_hash)
|
|
|
|
# index_api_keys_on_user_id (user_id)
|
2013-12-05 01:40:35 -05:00
|
|
|
#
|