1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
19 "git.arvados.org/arvados.git/lib/controller/rpc"
20 "git.arvados.org/arvados.git/sdk/go/arvados"
21 "git.arvados.org/arvados.git/sdk/go/arvadostest"
22 "git.arvados.org/arvados.git/sdk/go/auth"
23 "github.com/gorilla/mux"
24 check "gopkg.in/check.v1"
27 // Gocheck boilerplate
28 func Test(t *testing.T) {
32 var _ = check.Suite(&RouterSuite{})
34 type RouterSuite struct {
36 stub arvadostest.APIStub
39 func (s *RouterSuite) SetUpTest(c *check.C) {
40 s.stub = arvadostest.APIStub{}
45 ContainerWebServices: &arvados.ServiceWithPortRange{
46 Service: arvados.Service{
47 ExternalURL: arvados.URL{Host: "*.containers.zzzzz.example.com"},
55 func (s *RouterSuite) TestOptions(c *check.C) {
56 token := arvadostest.ActiveToken
57 for _, trial := range []struct {
58 comment string // unparsed -- only used to help match test failures to trials
64 shouldStatus int // zero value means 200
66 withOptions interface{}
67 checkOptions func(interface{}) // if non-nil, call instead of checking withOptions
71 path: "/arvados/v1/collections/" + arvadostest.FooCollection,
72 shouldCall: "CollectionGet",
73 withOptions: arvados.GetOptions{UUID: arvadostest.FooCollection},
77 path: "/arvados/v1/collections/" + arvadostest.FooCollection,
78 shouldCall: "CollectionUpdate",
79 withOptions: arvados.UpdateOptions{UUID: arvadostest.FooCollection},
83 path: "/arvados/v1/collections/" + arvadostest.FooCollection,
84 shouldCall: "CollectionUpdate",
85 withOptions: arvados.UpdateOptions{UUID: arvadostest.FooCollection},
89 path: "/arvados/v1/collections/" + arvadostest.FooCollection,
90 shouldCall: "CollectionDelete",
91 withOptions: arvados.DeleteOptions{UUID: arvadostest.FooCollection},
95 path: "/arvados/v1/collections",
96 shouldCall: "CollectionCreate",
97 withOptions: arvados.CreateOptions{},
101 path: "/arvados/v1/collections",
102 shouldCall: "CollectionList",
103 withOptions: arvados.ListOptions{Limit: -1},
107 path: "/arvados/v1/api_client_authorizations",
108 shouldCall: "APIClientAuthorizationList",
109 withOptions: arvados.ListOptions{Limit: -1},
113 path: "/arvados/v1/collections?limit=123&offset=456&include_trash=true&include_old_versions=1",
114 shouldCall: "CollectionList",
115 withOptions: arvados.ListOptions{Limit: 123, Offset: 456, IncludeTrash: true, IncludeOldVersions: true},
119 path: "/arvados/v1/collections?limit=123&_method=GET",
120 body: `{"offset":456,"include_trash":true,"include_old_versions":true}`,
121 shouldCall: "CollectionList",
122 withOptions: arvados.ListOptions{Limit: 123, Offset: 456, IncludeTrash: true, IncludeOldVersions: true},
126 path: "/arvados/v1/collections?limit=123",
127 body: `{"offset":456,"include_trash":true,"include_old_versions":true}`,
128 header: http.Header{"X-Http-Method-Override": {"GET"}, "Content-Type": {"application/json"}},
129 shouldCall: "CollectionList",
130 withOptions: arvados.ListOptions{Limit: 123, Offset: 456, IncludeTrash: true, IncludeOldVersions: true},
134 path: "/arvados/v1/collections?limit=123",
135 body: "offset=456&include_trash=true&include_old_versions=1&_method=GET",
136 header: http.Header{"Content-Type": {"application/x-www-form-urlencoded"}},
137 shouldCall: "CollectionList",
138 withOptions: arvados.ListOptions{Limit: 123, Offset: 456, IncludeTrash: true, IncludeOldVersions: true},
141 comment: "form-encoded expression filter in query string",
143 path: "/arvados/v1/collections?filters=[%22(foo<bar)%22]",
144 shouldCall: "CollectionList",
145 withOptions: arvados.ListOptions{Limit: -1, Filters: []arvados.Filter{{"(foo<bar)", "=", true}}},
148 comment: "form-encoded expression filter in POST body",
150 path: "/arvados/v1/collections",
151 body: "filters=[\"(foo<bar)\"]&_method=GET",
152 header: http.Header{"Content-Type": {"application/x-www-form-urlencoded"}},
153 shouldCall: "CollectionList",
154 withOptions: arvados.ListOptions{Limit: -1, Filters: []arvados.Filter{{"(foo<bar)", "=", true}}},
157 comment: "json-encoded expression filter in POST body",
159 path: "/arvados/v1/collections?_method=GET",
160 body: `{"filters":["(foo<bar)",["bar","=","baz"]],"limit":2}`,
161 header: http.Header{"Content-Type": {"application/json"}},
162 shouldCall: "CollectionList",
163 withOptions: arvados.ListOptions{Limit: 2, Filters: []arvados.Filter{{"(foo<bar)", "=", true}, {"bar", "=", "baz"}}},
166 comment: "json-encoded select param in query string",
168 path: "/arvados/v1/collections/" + arvadostest.FooCollection + "?select=[%22portable_data_hash%22]",
169 shouldCall: "CollectionGet",
170 withOptions: arvados.GetOptions{UUID: arvadostest.FooCollection, Select: []string{"portable_data_hash"}},
174 path: "/arvados/v1/collections",
175 shouldStatus: http.StatusMethodNotAllowed,
179 path: "/arvados/v1/collections",
180 shouldStatus: http.StatusMethodNotAllowed,
184 path: "/arvados/v1/collections",
185 shouldStatus: http.StatusMethodNotAllowed,
188 comment: "container log webdav GET root",
190 path: "/arvados/v1/container_requests/" + arvadostest.CompletedContainerRequestUUID + "/log/" + arvadostest.CompletedContainerUUID + "/",
191 shouldCall: "ContainerRequestLog",
192 withOptions: arvados.ContainerLogOptions{
193 UUID: arvadostest.CompletedContainerRequestUUID,
194 WebDAVOptions: arvados.WebDAVOptions{
196 Header: http.Header{"Authorization": {"Bearer " + arvadostest.ActiveToken}},
197 Path: "/" + arvadostest.CompletedContainerUUID + "/"}},
200 comment: "container log webdav GET root without trailing slash",
202 path: "/arvados/v1/container_requests/" + arvadostest.CompletedContainerRequestUUID + "/log/" + arvadostest.CompletedContainerUUID + "",
203 shouldCall: "ContainerRequestLog",
204 withOptions: arvados.ContainerLogOptions{
205 UUID: arvadostest.CompletedContainerRequestUUID,
206 WebDAVOptions: arvados.WebDAVOptions{
208 Header: http.Header{"Authorization": {"Bearer " + arvadostest.ActiveToken}},
209 Path: "/" + arvadostest.CompletedContainerUUID}},
212 comment: "container log webdav OPTIONS root",
214 path: "/arvados/v1/container_requests/" + arvadostest.CompletedContainerRequestUUID + "/log/" + arvadostest.CompletedContainerUUID + "/",
215 shouldCall: "ContainerRequestLog",
216 withOptions: arvados.ContainerLogOptions{
217 UUID: arvadostest.CompletedContainerRequestUUID,
218 WebDAVOptions: arvados.WebDAVOptions{
220 Header: http.Header{"Authorization": {"Bearer " + arvadostest.ActiveToken}},
221 Path: "/" + arvadostest.CompletedContainerUUID + "/"}},
224 comment: "container log webdav OPTIONS root without trailing slash",
226 path: "/arvados/v1/container_requests/" + arvadostest.CompletedContainerRequestUUID + "/log/" + arvadostest.CompletedContainerUUID,
227 shouldCall: "ContainerRequestLog",
228 withOptions: arvados.ContainerLogOptions{
229 UUID: arvadostest.CompletedContainerRequestUUID,
230 WebDAVOptions: arvados.WebDAVOptions{
232 Header: http.Header{"Authorization": {"Bearer " + arvadostest.ActiveToken}},
233 Path: "/" + arvadostest.CompletedContainerUUID}},
236 comment: "container log webdav OPTIONS for CORS",
237 unauthenticated: true,
239 path: "/arvados/v1/container_requests/" + arvadostest.CompletedContainerRequestUUID + "/log/" + arvadostest.CompletedContainerUUID + "/",
240 header: http.Header{"Access-Control-Request-Method": {"POST"}},
241 shouldCall: "ContainerRequestLog",
242 withOptions: arvados.ContainerLogOptions{
243 UUID: arvadostest.CompletedContainerRequestUUID,
244 WebDAVOptions: arvados.WebDAVOptions{
247 "Access-Control-Request-Method": {"POST"},
249 Path: "/" + arvadostest.CompletedContainerUUID + "/"}},
252 comment: "container log webdav PROPFIND root",
254 path: "/arvados/v1/container_requests/" + arvadostest.CompletedContainerRequestUUID + "/log/" + arvadostest.CompletedContainerUUID + "/",
255 shouldCall: "ContainerRequestLog",
256 withOptions: arvados.ContainerLogOptions{
257 UUID: arvadostest.CompletedContainerRequestUUID,
258 WebDAVOptions: arvados.WebDAVOptions{
260 Header: http.Header{"Authorization": {"Bearer " + arvadostest.ActiveToken}},
261 Path: "/" + arvadostest.CompletedContainerUUID + "/"}},
264 comment: "container log webdav PROPFIND root without trailing slash",
266 path: "/arvados/v1/container_requests/" + arvadostest.CompletedContainerRequestUUID + "/log/" + arvadostest.CompletedContainerUUID + "",
267 shouldCall: "ContainerRequestLog",
268 withOptions: arvados.ContainerLogOptions{
269 UUID: arvadostest.CompletedContainerRequestUUID,
270 WebDAVOptions: arvados.WebDAVOptions{
272 Header: http.Header{"Authorization": {"Bearer " + arvadostest.ActiveToken}},
273 Path: "/" + arvadostest.CompletedContainerUUID}},
276 comment: "container log webdav no_forward=true",
278 path: "/arvados/v1/container_requests/" + arvadostest.CompletedContainerRequestUUID + "/log/" + arvadostest.CompletedContainerUUID + "/?no_forward=true",
279 shouldCall: "ContainerRequestLog",
280 withOptions: arvados.ContainerLogOptions{
281 UUID: arvadostest.CompletedContainerRequestUUID,
283 WebDAVOptions: arvados.WebDAVOptions{
285 Header: http.Header{"Authorization": {"Bearer " + arvadostest.ActiveToken}},
286 Path: "/" + arvadostest.CompletedContainerUUID + "/"}},
289 comment: "/logX does not route to ContainerRequestLog",
291 path: "/arvados/v1/containers/" + arvadostest.CompletedContainerRequestUUID + "/logX",
292 shouldStatus: http.StatusNotFound,
296 comment: "container http proxy no_forward=true",
297 unauthenticated: true,
301 "Cookie": {"arvados_api_token=" + auth.EncodeTokenCookie([]byte(arvadostest.ActiveToken))},
302 "Host": {arvadostest.RunningContainerUUID + "-12345.containers.zzzzz.example.com"},
303 "X-Arvados-No-Forward": {"1"},
304 "X-Example-Header": {"preserved header value"},
306 shouldCall: "ContainerHTTPProxy",
307 checkOptions: func(gotOptions interface{}) {
308 opts, _ := gotOptions.(arvados.ContainerHTTPProxyOptions)
309 if !c.Check(opts, check.NotNil) {
312 c.Check(opts.Request.Method, check.Equals, "POST")
313 c.Check(opts.Request.URL.Path, check.Equals, "/foo/bar")
314 c.Check(opts.Request.Host, check.Equals, arvadostest.RunningContainerUUID+"-12345.containers.zzzzz.example.com")
315 c.Check(opts.Request.Header, check.DeepEquals, http.Header{
316 "Cookie": {"arvados_api_token=" + auth.EncodeTokenCookie([]byte(arvadostest.ActiveToken))},
317 "X-Example-Header": {"preserved header value"},
320 c.Check(opts, check.DeepEquals, arvados.ContainerHTTPProxyOptions{
321 Target: arvadostest.RunningContainerUUID + "-12345",
327 // Reset calls captured in previous trial
328 s.stub = arvadostest.APIStub{}
330 c.Logf("trial: %+v", trial)
331 comment := check.Commentf("trial comment: %s", trial.comment)
333 _, rr := doRequest(c, s.rtr, token, trial.method, trial.path, !trial.unauthenticated, trial.header, bytes.NewBufferString(trial.body), nil)
334 if trial.shouldStatus == 0 {
335 c.Check(rr.Code, check.Equals, http.StatusOK, comment)
337 c.Check(rr.Code, check.Equals, trial.shouldStatus, comment)
339 calls := s.stub.Calls(nil)
340 if trial.shouldCall == "" {
341 c.Check(calls, check.HasLen, 0, comment)
344 if !c.Check(calls, check.HasLen, 1, comment) {
347 c.Check(calls[0].Method, isMethodNamed, trial.shouldCall, comment)
348 if trial.checkOptions != nil {
349 trial.checkOptions(calls[0].Options)
351 c.Check(calls[0].Options, check.DeepEquals, trial.withOptions, comment)
356 var _ = check.Suite(&RouterIntegrationSuite{})
358 type RouterIntegrationSuite struct {
362 func (s *RouterIntegrationSuite) SetUpTest(c *check.C) {
363 cluster := &arvados.Cluster{}
364 cluster.TLS.Insecure = true
365 arvadostest.SetServiceURL(&cluster.Services.RailsAPI, "https://"+os.Getenv("ARVADOS_TEST_API_HOST"))
366 arvadostest.SetServiceURL(&cluster.Services.ContainerWebServices.Service, "https://*.containers.zzzzz.example.com")
367 url, _ := url.Parse("https://" + os.Getenv("ARVADOS_TEST_API_HOST"))
368 s.rtr = New(rpc.NewConn("zzzzz", url, true, rpc.PassthroughTokenProvider), Config{})
371 func (s *RouterIntegrationSuite) TearDownSuite(c *check.C) {
372 err := arvados.NewClientFromEnv().RequestAndDecode(nil, "POST", "database/reset", nil, nil)
373 c.Check(err, check.IsNil)
376 func (s *RouterIntegrationSuite) TestCollectionResponses(c *check.C) {
377 token := arvadostest.ActiveTokenV2
379 // Check "get collection" response has "kind" key
380 jresp := map[string]interface{}{}
381 _, rr := doRequest(c, s.rtr, token, "GET", `/arvados/v1/collections`, true, nil, bytes.NewBufferString(`{"include_trash":true}`), jresp)
382 c.Check(rr.Code, check.Equals, http.StatusOK)
383 c.Check(jresp["items"], check.FitsTypeOf, []interface{}{})
384 c.Check(jresp["kind"], check.Equals, "arvados#collectionList")
385 c.Check(jresp["items"].([]interface{})[0].(map[string]interface{})["kind"], check.Equals, "arvados#collection")
387 // Check items in list response have a "kind" key regardless
388 // of whether a uuid/pdh is selected.
389 for _, selectj := range []string{
391 `,"select":["portable_data_hash"]`,
392 `,"select":["name"]`,
393 `,"select":["uuid"]`,
395 jresp := map[string]interface{}{}
396 _, rr = doRequest(c, s.rtr, token, "GET", `/arvados/v1/collections`, true, nil, bytes.NewBufferString(`{"where":{"uuid":["`+arvadostest.FooCollection+`"]}`+selectj+`}`), jresp)
397 c.Check(rr.Code, check.Equals, http.StatusOK)
398 c.Check(jresp["items"], check.FitsTypeOf, []interface{}{})
399 c.Check(jresp["items_available"], check.FitsTypeOf, float64(0))
400 c.Check(jresp["kind"], check.Equals, "arvados#collectionList")
401 item0 := jresp["items"].([]interface{})[0].(map[string]interface{})
402 c.Check(item0["kind"], check.Equals, "arvados#collection")
403 if selectj == "" || strings.Contains(selectj, "portable_data_hash") {
404 c.Check(item0["portable_data_hash"], check.Equals, arvadostest.FooCollectionPDH)
406 c.Check(item0["portable_data_hash"], check.IsNil)
408 if selectj == "" || strings.Contains(selectj, "name") {
409 c.Check(item0["name"], check.FitsTypeOf, "")
411 c.Check(item0["name"], check.IsNil)
413 if selectj == "" || strings.Contains(selectj, "uuid") {
414 c.Check(item0["uuid"], check.Equals, arvadostest.FooCollection)
416 c.Check(item0["uuid"], check.IsNil)
420 // Check "create collection" response has "kind" key
421 jresp = map[string]interface{}{}
422 _, rr = doRequest(c, s.rtr, token, "POST", `/arvados/v1/collections`, true, http.Header{"Content-Type": {"application/x-www-form-urlencoded"}}, bytes.NewBufferString(`ensure_unique_name=true`), jresp)
423 c.Check(rr.Code, check.Equals, http.StatusOK)
424 c.Check(jresp["uuid"], check.FitsTypeOf, "")
425 c.Check(jresp["kind"], check.Equals, "arvados#collection")
428 func (s *RouterIntegrationSuite) TestMaxRequestSize(c *check.C) {
429 token := arvadostest.ActiveTokenV2
430 for _, maxRequestSize := range []int{
431 // Ensure 5M limit is enforced.
433 // Ensure 50M limit is enforced, and that a >25M body
434 // is accepted even though the default Go request size
438 s.rtr.config.MaxRequestSize = maxRequestSize
440 for len(okstr) < maxRequestSize/2 {
441 okstr = okstr + okstr
444 hdr := http.Header{"Content-Type": {"application/x-www-form-urlencoded"}}
446 body := bytes.NewBufferString(url.Values{"foo_bar": {okstr}}.Encode())
447 _, rr := doRequest(c, s.rtr, token, "POST", `/arvados/v1/collections`, true, hdr, body, nil)
448 c.Check(rr.Code, check.Equals, http.StatusOK)
450 body = bytes.NewBufferString(url.Values{"foo_bar": {okstr + okstr}}.Encode())
451 _, rr = doRequest(c, s.rtr, token, "POST", `/arvados/v1/collections`, true, hdr, body, nil)
452 c.Check(rr.Code, check.Equals, http.StatusRequestEntityTooLarge)
456 func (s *RouterIntegrationSuite) TestContainerList(c *check.C) {
457 token := arvadostest.ActiveTokenV2
459 jresp := map[string]interface{}{}
460 _, rr := doRequest(c, s.rtr, token, "GET", `/arvados/v1/containers?limit=0`, true, nil, nil, jresp)
461 c.Check(rr.Code, check.Equals, http.StatusOK)
462 c.Check(jresp["items_available"], check.FitsTypeOf, float64(0))
463 c.Check(jresp["items_available"].(float64) > 2, check.Equals, true)
464 c.Check(jresp["items"], check.NotNil)
465 c.Check(jresp["items"], check.HasLen, 0)
467 jresp = map[string]interface{}{}
468 _, rr = doRequest(c, s.rtr, token, "GET", `/arvados/v1/containers?filters=[["uuid","in",[]]]`, true, nil, nil, jresp)
469 c.Check(rr.Code, check.Equals, http.StatusOK)
470 c.Check(jresp["items_available"], check.Equals, float64(0))
471 c.Check(jresp["items"], check.NotNil)
472 c.Check(jresp["items"], check.HasLen, 0)
474 jresp = map[string]interface{}{}
475 _, rr = doRequest(c, s.rtr, token, "GET", `/arvados/v1/containers?limit=2&select=["uuid","command"]`, true, nil, nil, jresp)
476 c.Check(rr.Code, check.Equals, http.StatusOK)
477 c.Check(jresp["items_available"], check.FitsTypeOf, float64(0))
478 c.Check(jresp["items_available"].(float64) > 2, check.Equals, true)
479 c.Check(jresp["items"], check.HasLen, 2)
480 item0 := jresp["items"].([]interface{})[0].(map[string]interface{})
481 c.Check(item0["uuid"], check.HasLen, 27)
482 c.Check(item0["command"], check.FitsTypeOf, []interface{}{})
483 c.Check(item0["command"].([]interface{})[0], check.FitsTypeOf, "")
484 c.Check(item0["mounts"], check.IsNil)
486 jresp = map[string]interface{}{}
487 _, rr = doRequest(c, s.rtr, token, "GET", `/arvados/v1/containers`, true, nil, nil, jresp)
488 c.Check(rr.Code, check.Equals, http.StatusOK)
489 c.Check(jresp["items_available"], check.FitsTypeOf, float64(0))
490 c.Check(jresp["items_available"].(float64) > 2, check.Equals, true)
491 avail := int(jresp["items_available"].(float64))
492 c.Check(jresp["items"], check.HasLen, avail)
493 item0 = jresp["items"].([]interface{})[0].(map[string]interface{})
494 c.Check(item0["uuid"], check.HasLen, 27)
495 c.Check(item0["command"], check.FitsTypeOf, []interface{}{})
496 c.Check(item0["command"].([]interface{})[0], check.FitsTypeOf, "")
497 c.Check(item0["mounts"], check.NotNil)
500 func (s *RouterIntegrationSuite) TestContainerLock(c *check.C) {
501 uuid := arvadostest.QueuedContainerUUID
502 token := arvadostest.AdminToken
504 jresp := map[string]interface{}{}
505 _, rr := doRequest(c, s.rtr, token, "POST", "/arvados/v1/containers/"+uuid+"/lock", true, nil, nil, jresp)
506 c.Check(rr.Code, check.Equals, http.StatusOK)
507 c.Check(jresp["uuid"], check.HasLen, 27)
508 c.Check(jresp["state"], check.Equals, "Locked")
510 _, rr = doRequest(c, s.rtr, token, "POST", "/arvados/v1/containers/"+uuid+"/lock", true, nil, nil, nil)
511 c.Check(rr.Code, check.Equals, http.StatusUnprocessableEntity)
512 c.Check(rr.Body.String(), check.Not(check.Matches), `.*"uuid":.*`)
514 jresp = map[string]interface{}{}
515 _, rr = doRequest(c, s.rtr, token, "POST", "/arvados/v1/containers/"+uuid+"/unlock", true, nil, nil, jresp)
516 c.Check(rr.Code, check.Equals, http.StatusOK)
517 c.Check(jresp["uuid"], check.HasLen, 27)
518 c.Check(jresp["state"], check.Equals, "Queued")
519 c.Check(jresp["environment"], check.IsNil)
521 jresp = map[string]interface{}{}
522 _, rr = doRequest(c, s.rtr, token, "POST", "/arvados/v1/containers/"+uuid+"/unlock", true, nil, nil, jresp)
523 c.Check(rr.Code, check.Equals, http.StatusUnprocessableEntity)
524 c.Check(jresp["uuid"], check.IsNil)
527 func (s *RouterIntegrationSuite) TestWritableBy(c *check.C) {
528 jresp := map[string]interface{}{}
529 _, rr := doRequest(c, s.rtr, arvadostest.ActiveTokenV2, "GET", `/arvados/v1/users/`+arvadostest.ActiveUserUUID, true, nil, nil, jresp)
530 c.Check(rr.Code, check.Equals, http.StatusOK)
531 c.Check(jresp["writable_by"], check.DeepEquals, []interface{}{"zzzzz-tpzed-000000000000000", "zzzzz-tpzed-xurymjxw79nv3jz", "zzzzz-j7d0g-48foin4vonvc2at"})
534 func (s *RouterIntegrationSuite) TestFullTimestampsInResponse(c *check.C) {
535 uuid := arvadostest.CollectionReplicationDesired2Confirmed2UUID
536 token := arvadostest.ActiveTokenV2
538 jresp := map[string]interface{}{}
539 _, rr := doRequest(c, s.rtr, token, "GET", `/arvados/v1/collections/`+uuid, true, nil, nil, jresp)
540 c.Check(rr.Code, check.Equals, http.StatusOK)
541 c.Check(jresp["uuid"], check.Equals, uuid)
542 expectNS := map[string]int{
543 "created_at": 596506000, // fixture says 596506247, but truncated by postgresql
544 "modified_at": 596338000, // fixture says 596338465, but truncated by postgresql
546 for key, ns := range expectNS {
547 mt, ok := jresp[key].(string)
548 c.Logf("jresp[%q] == %q", key, mt)
549 c.Assert(ok, check.Equals, true)
550 t, err := time.Parse(time.RFC3339Nano, mt)
551 c.Check(err, check.IsNil)
552 c.Check(t.Nanosecond(), check.Equals, ns)
556 func (s *RouterIntegrationSuite) TestSelectParam(c *check.C) {
557 uuid := arvadostest.QueuedContainerUUID
558 token := arvadostest.ActiveTokenV2
560 for _, sel := range [][]string{
562 {"uuid", "command", "uuid"},
564 j, err := json.Marshal(sel)
565 c.Assert(err, check.IsNil)
566 jresp := map[string]interface{}{}
567 _, rr := doRequest(c, s.rtr, token, "GET", "/arvados/v1/containers/"+uuid+"?select="+string(j), true, nil, nil, jresp)
568 c.Check(rr.Code, check.Equals, http.StatusOK)
570 c.Check(jresp["kind"], check.Equals, "arvados#container")
571 c.Check(jresp["uuid"], check.HasLen, 27)
572 c.Check(jresp["command"], check.HasLen, 2)
573 c.Check(jresp["mounts"], check.IsNil)
574 _, hasMounts := jresp["mounts"]
575 c.Check(hasMounts, check.Equals, false)
578 uuid = arvadostest.FooCollection
579 j, err := json.Marshal([]string{"uuid", "description"})
580 c.Assert(err, check.IsNil)
581 for _, method := range []string{"PUT", "POST"} {
582 desc := "Today is " + time.Now().String()
583 reqBody := "{\"description\":\"" + desc + "\"}"
584 jresp := map[string]interface{}{}
585 var rr *httptest.ResponseRecorder
587 _, rr = doRequest(c, s.rtr, token, method, "/arvados/v1/collections/"+uuid+"?select="+string(j), true, nil, bytes.NewReader([]byte(reqBody)), jresp)
589 _, rr = doRequest(c, s.rtr, token, method, "/arvados/v1/collections?select="+string(j), true, nil, bytes.NewReader([]byte(reqBody)), jresp)
591 c.Check(rr.Code, check.Equals, http.StatusOK)
592 c.Check(jresp["kind"], check.Equals, "arvados#collection")
593 c.Check(jresp["uuid"], check.HasLen, 27)
594 c.Check(jresp["description"], check.Equals, desc)
595 c.Check(jresp["manifest_text"], check.IsNil)
599 func (s *RouterIntegrationSuite) TestIncluded(c *check.C) {
600 for _, trial := range []struct {
602 expectOwnerUUID string
603 expectOwnerKind string
606 uuid: arvadostest.ASubprojectUUID,
607 expectOwnerUUID: arvadostest.AProjectUUID,
608 expectOwnerKind: "arvados#group",
611 uuid: arvadostest.AProjectUUID,
612 expectOwnerUUID: arvadostest.ActiveUserUUID,
613 expectOwnerKind: "arvados#user",
616 c.Logf("trial: %#v", trial)
617 token := arvadostest.ActiveTokenV2
618 jresp := map[string]interface{}{}
619 _, rr := doRequest(c, s.rtr, token, "GET", `/arvados/v1/groups/contents?include=owner_uuid&filters=[["uuid","=","`+trial.uuid+`"]]`, true, nil, nil, jresp)
620 c.Check(rr.Code, check.Equals, http.StatusOK)
622 c.Assert(jresp["included"], check.FitsTypeOf, []interface{}{})
623 included, ok := jresp["included"].([]interface{})
624 c.Assert(ok, check.Equals, true)
625 c.Assert(included, check.HasLen, 1)
626 owner, ok := included[0].(map[string]interface{})
627 c.Assert(ok, check.Equals, true)
628 c.Check(owner["kind"], check.Equals, trial.expectOwnerKind)
629 c.Check(owner["uuid"], check.Equals, trial.expectOwnerUUID)
633 func (s *RouterIntegrationSuite) TestHEAD(c *check.C) {
634 _, rr := doRequest(c, s.rtr, arvadostest.ActiveTokenV2, "HEAD", "/arvados/v1/containers/"+arvadostest.QueuedContainerUUID, true, nil, nil, nil)
635 c.Check(rr.Code, check.Equals, http.StatusOK)
638 func (s *RouterIntegrationSuite) TestRouteNotFound(c *check.C) {
639 token := arvadostest.ActiveTokenV2
642 path: "arvados/v1/collections/" + arvadostest.FooCollection + "/error404pls",
645 rr := httptest.NewRecorder()
646 s.rtr.ServeHTTP(rr, req)
647 c.Check(rr.Code, check.Equals, http.StatusNotFound)
648 c.Logf("body: %q", rr.Body.String())
649 var j map[string]interface{}
650 err := json.Unmarshal(rr.Body.Bytes(), &j)
651 c.Check(err, check.IsNil)
652 c.Logf("decoded: %v", j)
653 c.Assert(j["errors"], check.FitsTypeOf, []interface{}{})
654 c.Check(j["errors"].([]interface{})[0], check.Equals, "API endpoint not found")
657 func (s *RouterIntegrationSuite) TestCORS(c *check.C) {
658 token := arvadostest.ActiveTokenV2
661 path: "arvados/v1/collections/" + arvadostest.FooCollection,
662 header: http.Header{"Origin": {"https://example.com"}},
665 rr := httptest.NewRecorder()
666 s.rtr.ServeHTTP(rr, req)
667 c.Check(rr.Code, check.Equals, http.StatusOK)
668 c.Check(rr.Body.String(), check.HasLen, 0)
669 c.Check(rr.Result().Header.Get("Access-Control-Allow-Origin"), check.Equals, "*")
670 for _, hdr := range []string{"Authorization", "Content-Type"} {
671 c.Check(rr.Result().Header.Get("Access-Control-Allow-Headers"), check.Matches, ".*"+hdr+".*")
673 for _, method := range []string{"GET", "HEAD", "PUT", "POST", "PATCH", "DELETE"} {
674 c.Check(rr.Result().Header.Get("Access-Control-Allow-Methods"), check.Matches, ".*"+method+".*")
677 for _, unsafe := range []string{"login", "logout", "auth", "auth/foo", "login/?blah"} {
681 header: http.Header{"Origin": {"https://example.com"}},
684 rr := httptest.NewRecorder()
685 s.rtr.ServeHTTP(rr, req)
686 c.Check(rr.Code, check.Equals, http.StatusOK)
687 c.Check(rr.Body.String(), check.HasLen, 0)
688 c.Check(rr.Result().Header.Get("Access-Control-Allow-Origin"), check.Equals, "")
689 c.Check(rr.Result().Header.Get("Access-Control-Allow-Methods"), check.Equals, "")
690 c.Check(rr.Result().Header.Get("Access-Control-Allow-Headers"), check.Equals, "")
695 header: http.Header{"Origin": {"https://example.com"}},
698 rr = httptest.NewRecorder()
699 s.rtr.ServeHTTP(rr, req)
700 c.Check(rr.Result().Header.Get("Access-Control-Allow-Origin"), check.Equals, "")
701 c.Check(rr.Result().Header.Get("Access-Control-Allow-Methods"), check.Equals, "")
702 c.Check(rr.Result().Header.Get("Access-Control-Allow-Headers"), check.Equals, "")
706 func (s *RouterIntegrationSuite) TestComputedPermissionList(c *check.C) {
707 token := arvadostest.AdminToken
709 jresp := map[string]interface{}{}
710 _, rr := doRequest(c, s.rtr, token, "GET", `/arvados/v1/computed_permissions?filters=[["user_uuid","=","`+arvadostest.ActiveUserUUID+`"],["target_uuid","=","`+arvadostest.AProjectUUID+`"]]&select=["perm_level"]`, true, nil, nil, jresp)
711 c.Check(rr.Code, check.Equals, http.StatusOK)
712 c.Check(jresp["items_available"], check.IsNil)
713 if c.Check(jresp["items"], check.HasLen, 1) {
714 item := jresp["items"].([]interface{})[0].(map[string]interface{})
715 c.Check(item, check.DeepEquals, map[string]interface{}{
716 "kind": "arvados#computedPermission",
717 "perm_level": "can_manage",
722 func doRequest(c *check.C, rtr http.Handler, token, method, path string, auth bool, hdrs http.Header, body io.Reader, jresp map[string]interface{}) (*http.Request, *httptest.ResponseRecorder) {
723 req := httptest.NewRequest(method, path, body)
724 for k, v := range hdrs {
725 if k == "Host" && len(v) == 1 {
732 req.Header.Set("Authorization", "Bearer "+token)
734 rr := httptest.NewRecorder()
735 rtr.ServeHTTP(rr, req)
736 respbody := rr.Body.String()
737 if len(respbody) > 10000 {
738 respbody = respbody[:10000] + "[...]"
740 c.Logf("response body: %s", respbody)
742 err := json.Unmarshal(rr.Body.Bytes(), &jresp)
743 c.Check(err, check.IsNil)