1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
15 "git.arvados.org/arvados.git/sdk/go/auth"
16 "git.arvados.org/arvados.git/sdk/go/httpserver"
19 func remoteContainerRequestCreate(
20 h *genericFederatedRequestHandler,
21 effectiveMethod string,
25 w http.ResponseWriter,
26 req *http.Request) bool {
28 if effectiveMethod != "POST" || uuid != "" || remainder != "" {
32 // First make sure supplied token is valid.
33 creds := auth.NewCredentials()
34 creds.LoadTokensFromHTTPRequest(req)
36 currentUser, ok, err := h.handler.validateAPItoken(req, creds.Tokens[0])
38 httpserver.Error(w, err.Error(), http.StatusInternalServerError)
41 httpserver.Error(w, "invalid API token", http.StatusForbidden)
46 *clusterId = h.handler.Cluster.ClusterID
49 if strings.HasPrefix(currentUser.Authorization.UUID, h.handler.Cluster.ClusterID) &&
50 *clusterId == h.handler.Cluster.ClusterID {
51 // local user submitting container request to local cluster
55 if req.Header.Get("Content-Type") != "application/json" {
56 httpserver.Error(w, "Expected Content-Type: application/json, got "+req.Header.Get("Content-Type"), http.StatusBadRequest)
60 originalBody := req.Body
61 defer originalBody.Close()
62 var request map[string]interface{}
63 err = json.NewDecoder(req.Body).Decode(&request)
65 httpserver.Error(w, err.Error(), http.StatusBadRequest)
69 crString, ok := request["container_request"].(string)
71 var crJson map[string]interface{}
72 err := json.Unmarshal([]byte(crString), &crJson)
74 httpserver.Error(w, err.Error(), http.StatusBadRequest)
78 request["container_request"] = crJson
81 containerRequest, ok := request["container_request"].(map[string]interface{})
83 // Use toplevel object as the container_request object
84 containerRequest = request
87 // If runtime_token is not set, create a new token
88 if _, ok := containerRequest["runtime_token"]; !ok {
89 if len(currentUser.Authorization.Scopes) != 1 || currentUser.Authorization.Scopes[0] != "all" {
90 httpserver.Error(w, "Token scope is not [all]", http.StatusForbidden)
94 if strings.HasPrefix(currentUser.Authorization.UUID, h.handler.Cluster.ClusterID) {
95 // Local user, submitting to a remote cluster.
96 // Create a new time-limited token.
97 newtok, err := h.handler.createAPItoken(req, currentUser.UUID, nil)
99 httpserver.Error(w, err.Error(), http.StatusForbidden)
102 containerRequest["runtime_token"] = newtok.TokenV2()
104 // Remote user. Container request will use the
105 // current token, minus the trailing portion
106 // (optional container uuid).
107 sp := strings.Split(creds.Tokens[0], "/")
109 containerRequest["runtime_token"] = strings.Join(sp[0:3], "/")
111 containerRequest["runtime_token"] = creds.Tokens[0]
116 newbody, err := json.Marshal(request)
117 buf := bytes.NewBuffer(newbody)
118 req.Body = ioutil.NopCloser(buf)
119 req.ContentLength = int64(buf.Len())
120 req.Header.Set("Content-Length", fmt.Sprintf("%v", buf.Len()))
122 resp, err := h.handler.remoteClusterRequest(*clusterId, req)
123 h.handler.proxy.ForwardResponse(w, resp, err)