1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
26 "git.arvados.org/arvados.git/sdk/go/arvados"
27 "git.arvados.org/arvados.git/sdk/go/auth"
28 "git.arvados.org/arvados.git/sdk/go/ctxlog"
29 "git.arvados.org/arvados.git/sdk/go/httpserver"
32 const rfc3339NanoFixed = "2006-01-02T15:04:05.000000000Z07:00"
34 type TokenProvider func(context.Context) ([]string, error)
36 func PassthroughTokenProvider(ctx context.Context) ([]string, error) {
37 incoming, ok := auth.FromContext(ctx)
39 return nil, errors.New("no token provided")
41 return incoming.Tokens, nil
45 SendHeader http.Header
46 RedactHostInErrors bool
49 httpClient http.Client
51 tokenProvider TokenProvider
52 discoveryDocument *arvados.DiscoveryDocument
53 discoveryDocumentMtx sync.Mutex
54 discoveryDocumentExpires time.Time
57 func NewConn(clusterID string, url *url.URL, insecure bool, tp TokenProvider) *Conn {
58 transport := http.DefaultTransport
60 // It's not safe to copy *http.DefaultTransport
61 // because it has a mutex (which might be locked)
62 // protecting a private map (which might not be nil).
63 // So we build our own, using the Go 1.12 default
64 // values, ignoring any changes the application has
65 // made to http.DefaultTransport.
66 transport = &http.Transport{
67 DialContext: (&net.Dialer{
68 Timeout: 30 * time.Second,
69 KeepAlive: 30 * time.Second,
73 IdleConnTimeout: 90 * time.Second,
74 TLSHandshakeTimeout: 10 * time.Second,
75 ExpectContinueTimeout: 1 * time.Second,
76 TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
81 httpClient: http.Client{
82 CheckRedirect: func(req *http.Request, via []*http.Request) error { return http.ErrUseLastResponse },
90 func (conn *Conn) requestAndDecode(ctx context.Context, dst interface{}, ep arvados.APIEndpoint, body io.Reader, opts interface{}) error {
91 aClient := arvados.Client{
92 Client: &conn.httpClient,
93 Scheme: conn.baseURL.Scheme,
94 APIHost: conn.baseURL.Host,
95 SendHeader: conn.SendHeader,
99 tokens, err := conn.tokenProvider(ctx)
102 } else if len(tokens) > 0 {
103 ctx = arvados.ContextWithAuthorization(ctx, "Bearer "+tokens[0])
105 // Use a non-empty auth string to ensure we override
106 // any default token set on aClient -- and to avoid
107 // having the remote prompt us to send a token by
109 ctx = arvados.ContextWithAuthorization(ctx, "Bearer -")
112 // Encode opts to JSON and decode from there to a
113 // map[string]interface{}, so we can munge the query params
114 // using the JSON key names specified by opts' struct tags.
115 j, err := json.Marshal(opts)
117 return fmt.Errorf("%T: requestAndDecode: Marshal opts: %s", conn, err)
119 var params map[string]interface{}
120 dec := json.NewDecoder(bytes.NewBuffer(j))
122 err = dec.Decode(¶ms)
124 return fmt.Errorf("%T: requestAndDecode: Decode opts: %s", conn, err)
126 if attrs, ok := params["attrs"]; ok && ep.AttrsKey != "" {
127 params[ep.AttrsKey] = attrs
128 delete(params, "attrs")
130 if limitStr, ok := params["limit"]; ok {
131 if limit, err := strconv.ParseInt(string(limitStr.(json.Number)), 10, 64); err == nil && limit < 0 {
132 // Negative limit means "not specified" here, but some
133 // servers/versions do not accept that, so we need to
134 // remove it entirely.
135 delete(params, "limit")
139 if authinfo, ok := params["auth_info"]; ok {
140 if tmp, ok2 := authinfo.(map[string]interface{}); ok2 {
141 for k, v := range tmp {
142 if strings.HasSuffix(k, "_at") {
143 // Change zero times values to nil
144 if v, ok3 := v.(string); ok3 && (strings.HasPrefix(v, "0001-01-01T00:00:00") || v == "") {
154 params = make(map[string]interface{})
156 params["reader_tokens"] = tokens[1:]
159 if strings.Contains(ep.Path, "/{uuid}") && params != nil {
160 uuid, _ := params["uuid"].(string)
161 path = strings.Replace(path, "/{uuid}", "/"+uuid, 1)
162 delete(params, "uuid")
164 err = aClient.RequestAndDecodeContext(ctx, dst, ep.Method, path, body, params)
165 if err != nil && conn.RedactHostInErrors {
166 redacted := strings.Replace(err.Error(), strings.TrimSuffix(conn.baseURL.String(), "/"), "//railsapi.internal", -1)
167 if strings.HasPrefix(redacted, "request failed: ") {
168 redacted = strings.Replace(redacted, "request failed: ", "", -1)
170 if redacted != err.Error() {
171 if err, ok := err.(httpStatusError); ok {
172 return wrapHTTPStatusError(err, redacted)
174 return errors.New(redacted)
181 func (conn *Conn) BaseURL() url.URL {
185 func (conn *Conn) ConfigGet(ctx context.Context) (json.RawMessage, error) {
186 ep := arvados.EndpointConfigGet
187 var resp json.RawMessage
188 err := conn.requestAndDecode(ctx, &resp, ep, nil, nil)
192 func (conn *Conn) VocabularyGet(ctx context.Context) (arvados.Vocabulary, error) {
193 ep := arvados.EndpointVocabularyGet
194 var resp arvados.Vocabulary
195 err := conn.requestAndDecode(ctx, &resp, ep, nil, nil)
199 func (conn *Conn) DiscoveryDocument(ctx context.Context) (arvados.DiscoveryDocument, error) {
200 conn.discoveryDocumentMtx.Lock()
201 defer conn.discoveryDocumentMtx.Unlock()
202 if conn.discoveryDocument != nil && time.Now().Before(conn.discoveryDocumentExpires) {
203 return *conn.discoveryDocument, nil
205 var dd arvados.DiscoveryDocument
206 err := conn.requestAndDecode(ctx, &dd, arvados.EndpointDiscoveryDocument, nil, nil)
210 conn.discoveryDocument = &dd
211 conn.discoveryDocumentExpires = time.Now().Add(time.Hour)
212 return *conn.discoveryDocument, nil
215 func (conn *Conn) Login(ctx context.Context, options arvados.LoginOptions) (arvados.LoginResponse, error) {
216 ep := arvados.EndpointLogin
217 var resp arvados.LoginResponse
218 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
219 resp.RedirectLocation = conn.relativeToBaseURL(resp.RedirectLocation)
223 func (conn *Conn) Logout(ctx context.Context, options arvados.LogoutOptions) (arvados.LogoutResponse, error) {
224 ep := arvados.EndpointLogout
225 var resp arvados.LogoutResponse
226 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
227 resp.RedirectLocation = conn.relativeToBaseURL(resp.RedirectLocation)
231 // If the given location is a valid URL and its origin is the same as
232 // conn.baseURL, return it as a relative URL. Otherwise, return it
234 func (conn *Conn) relativeToBaseURL(location string) string {
235 u, err := url.Parse(location)
236 if err == nil && u.Scheme == conn.baseURL.Scheme && strings.ToLower(u.Host) == strings.ToLower(conn.baseURL.Host) {
246 func (conn *Conn) AuthorizedKeyCreate(ctx context.Context, options arvados.CreateOptions) (arvados.AuthorizedKey, error) {
247 ep := arvados.EndpointAuthorizedKeyCreate
248 var resp arvados.AuthorizedKey
249 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
253 func (conn *Conn) AuthorizedKeyUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.AuthorizedKey, error) {
254 ep := arvados.EndpointAuthorizedKeyUpdate
255 var resp arvados.AuthorizedKey
256 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
260 func (conn *Conn) AuthorizedKeyGet(ctx context.Context, options arvados.GetOptions) (arvados.AuthorizedKey, error) {
261 ep := arvados.EndpointAuthorizedKeyGet
262 var resp arvados.AuthorizedKey
263 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
267 func (conn *Conn) AuthorizedKeyList(ctx context.Context, options arvados.ListOptions) (arvados.AuthorizedKeyList, error) {
268 ep := arvados.EndpointAuthorizedKeyList
269 var resp arvados.AuthorizedKeyList
270 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
274 func (conn *Conn) AuthorizedKeyDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.AuthorizedKey, error) {
275 ep := arvados.EndpointAuthorizedKeyDelete
276 var resp arvados.AuthorizedKey
277 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
281 func (conn *Conn) CollectionCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Collection, error) {
282 ep := arvados.EndpointCollectionCreate
283 var resp arvados.Collection
284 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
288 func (conn *Conn) CollectionUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.Collection, error) {
289 ep := arvados.EndpointCollectionUpdate
290 var resp arvados.Collection
291 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
295 func (conn *Conn) CollectionGet(ctx context.Context, options arvados.GetOptions) (arvados.Collection, error) {
296 ep := arvados.EndpointCollectionGet
297 var resp arvados.Collection
298 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
302 func (conn *Conn) CollectionList(ctx context.Context, options arvados.ListOptions) (arvados.CollectionList, error) {
303 ep := arvados.EndpointCollectionList
304 var resp arvados.CollectionList
305 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
309 func (conn *Conn) CollectionProvenance(ctx context.Context, options arvados.GetOptions) (map[string]interface{}, error) {
310 ep := arvados.EndpointCollectionProvenance
311 var resp map[string]interface{}
312 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
316 func (conn *Conn) CollectionUsedBy(ctx context.Context, options arvados.GetOptions) (map[string]interface{}, error) {
317 ep := arvados.EndpointCollectionUsedBy
318 var resp map[string]interface{}
319 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
323 func (conn *Conn) CollectionDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.Collection, error) {
324 ep := arvados.EndpointCollectionDelete
325 var resp arvados.Collection
326 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
330 func (conn *Conn) CollectionTrash(ctx context.Context, options arvados.DeleteOptions) (arvados.Collection, error) {
331 ep := arvados.EndpointCollectionTrash
332 var resp arvados.Collection
333 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
337 func (conn *Conn) CollectionUntrash(ctx context.Context, options arvados.UntrashOptions) (arvados.Collection, error) {
338 ep := arvados.EndpointCollectionUntrash
339 var resp arvados.Collection
340 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
344 func (conn *Conn) ComputedPermissionList(ctx context.Context, options arvados.ListOptions) (arvados.ComputedPermissionList, error) {
345 ep := arvados.EndpointComputedPermissionList
346 var resp arvados.ComputedPermissionList
347 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
351 func (conn *Conn) ContainerCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Container, error) {
352 ep := arvados.EndpointContainerCreate
353 var resp arvados.Container
354 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
358 func (conn *Conn) ContainerUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.Container, error) {
359 ep := arvados.EndpointContainerUpdate
360 var resp arvados.Container
361 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
365 func (conn *Conn) ContainerPriorityUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.Container, error) {
366 ep := arvados.EndpointContainerPriorityUpdate
367 var resp arvados.Container
368 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
372 func (conn *Conn) ContainerGet(ctx context.Context, options arvados.GetOptions) (arvados.Container, error) {
373 ep := arvados.EndpointContainerGet
374 var resp arvados.Container
375 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
379 func (conn *Conn) ContainerList(ctx context.Context, options arvados.ListOptions) (arvados.ContainerList, error) {
380 ep := arvados.EndpointContainerList
381 var resp arvados.ContainerList
382 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
386 func (conn *Conn) ContainerDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.Container, error) {
387 ep := arvados.EndpointContainerDelete
388 var resp arvados.Container
389 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
393 func (conn *Conn) ContainerLock(ctx context.Context, options arvados.GetOptions) (arvados.Container, error) {
394 ep := arvados.EndpointContainerLock
395 var resp arvados.Container
396 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
400 func (conn *Conn) ContainerUnlock(ctx context.Context, options arvados.GetOptions) (arvados.Container, error) {
401 ep := arvados.EndpointContainerUnlock
402 var resp arvados.Container
403 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
407 func (conn *Conn) ContainerHTTPProxy(ctx context.Context, options arvados.ContainerHTTPProxyOptions) (http.Handler, error) {
408 return nil, errors.New("not implemented")
411 // ContainerSSH returns a connection to the out-of-band SSH server for
412 // a running container. If the returned error is nil, the caller is
413 // responsible for closing sshconn.Conn.
414 func (conn *Conn) ContainerSSH(ctx context.Context, options arvados.ContainerSSHOptions) (sshconn arvados.ConnectionResponse, err error) {
415 u, err := conn.baseURL.Parse("/" + strings.Replace(arvados.EndpointContainerSSHCompat.Path, "{uuid}", options.UUID, -1))
417 err = fmt.Errorf("url.Parse: %w", err)
420 return conn.socket(ctx, u, "ssh", url.Values{
421 "detach_keys": {options.DetachKeys},
422 "login_username": {options.LoginUsername},
423 "no_forward": {fmt.Sprintf("%v", options.NoForward)},
427 // ContainerGatewayTunnel returns a connection to a yamux session on
428 // the controller. The caller should connect the returned resp.Conn to
429 // a client-side yamux session.
430 func (conn *Conn) ContainerGatewayTunnel(ctx context.Context, options arvados.ContainerGatewayTunnelOptions) (tunnelconn arvados.ConnectionResponse, err error) {
431 u, err := conn.baseURL.Parse("/" + strings.Replace(arvados.EndpointContainerGatewayTunnelCompat.Path, "{uuid}", options.UUID, -1))
433 err = fmt.Errorf("url.Parse: %w", err)
436 return conn.socket(ctx, u, "tunnel", url.Values{
437 "auth_secret": {options.AuthSecret},
441 // socket sets up a socket using the specified API endpoint and
443 func (conn *Conn) socket(ctx context.Context, u *url.URL, upgradeHeader string, postform url.Values) (connresp arvados.ConnectionResponse, err error) {
444 addr := conn.baseURL.Host
445 if strings.Index(addr, ":") < 1 || (strings.Contains(addr, "::") && addr[0] != '[') {
446 // hostname or ::1 or 1::1
447 addr = net.JoinHostPort(addr, "https")
450 if tlsconf := conn.httpClient.Transport.(*http.Transport).TLSClientConfig; tlsconf != nil && tlsconf.InsecureSkipVerify {
453 netconn, err := tls.Dial("tcp", addr, &tls.Config{InsecureSkipVerify: insecure})
455 return connresp, fmt.Errorf("tls.Dial: %w", err)
462 bufr := bufio.NewReader(netconn)
463 bufw := bufio.NewWriter(netconn)
465 tokens, err := conn.tokenProvider(ctx)
468 } else if len(tokens) < 1 {
469 return connresp, httpserver.ErrorWithStatus(errors.New("unauthorized"), http.StatusUnauthorized)
471 postdata := postform.Encode()
472 bufw.WriteString("POST " + u.String() + " HTTP/1.1\r\n")
473 bufw.WriteString("Authorization: Bearer " + tokens[0] + "\r\n")
474 bufw.WriteString("Host: " + u.Host + "\r\n")
475 bufw.WriteString("Upgrade: " + upgradeHeader + "\r\n")
476 bufw.WriteString("Content-Type: application/x-www-form-urlencoded\r\n")
477 fmt.Fprintf(bufw, "Content-Length: %d\r\n", len(postdata))
478 bufw.WriteString("\r\n")
479 bufw.WriteString(postdata)
481 resp, err := http.ReadResponse(bufr, &http.Request{Method: "POST"})
483 return connresp, fmt.Errorf("http.ReadResponse: %w", err)
485 defer resp.Body.Close()
486 if resp.StatusCode != http.StatusSwitchingProtocols {
487 ctxlog.FromContext(ctx).Infof("rpc.Conn.socket: server %s did not switch protocols, got status %s", u.String(), resp.Status)
488 body, _ := ioutil.ReadAll(io.LimitReader(resp.Body, 10000))
490 var errDoc httpserver.ErrorResponse
491 if err := json.Unmarshal(body, &errDoc); err == nil {
492 message = strings.Join(errDoc.Errors, "; ")
494 message = fmt.Sprintf("%q", body)
496 return connresp, httpserver.ErrorWithStatus(fmt.Errorf("server did not provide a tunnel: %s: %s", resp.Status, message), resp.StatusCode)
498 if strings.ToLower(resp.Header.Get("Upgrade")) != upgradeHeader ||
499 strings.ToLower(resp.Header.Get("Connection")) != "upgrade" {
500 return connresp, httpserver.ErrorWithStatus(fmt.Errorf("bad response from server: Upgrade %q Connection %q", resp.Header.Get("Upgrade"), resp.Header.Get("Connection")), http.StatusBadGateway)
502 connresp.Conn = netconn
503 connresp.Bufrw = &bufio.ReadWriter{Reader: bufr, Writer: bufw}
504 connresp.Header = resp.Header
508 func (conn *Conn) ContainerRequestCreate(ctx context.Context, options arvados.CreateOptions) (arvados.ContainerRequest, error) {
509 ep := arvados.EndpointContainerRequestCreate
510 var resp arvados.ContainerRequest
511 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
515 func (conn *Conn) ContainerRequestUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.ContainerRequest, error) {
516 ep := arvados.EndpointContainerRequestUpdate
517 var resp arvados.ContainerRequest
518 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
522 func (conn *Conn) ContainerRequestGet(ctx context.Context, options arvados.GetOptions) (arvados.ContainerRequest, error) {
523 ep := arvados.EndpointContainerRequestGet
524 var resp arvados.ContainerRequest
525 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
529 func (conn *Conn) ContainerRequestList(ctx context.Context, options arvados.ListOptions) (arvados.ContainerRequestList, error) {
530 ep := arvados.EndpointContainerRequestList
531 var resp arvados.ContainerRequestList
532 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
536 func (conn *Conn) ContainerRequestDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.ContainerRequest, error) {
537 ep := arvados.EndpointContainerRequestDelete
538 var resp arvados.ContainerRequest
539 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
543 func (conn *Conn) ContainerRequestContainerStatus(ctx context.Context, options arvados.GetOptions) (arvados.ContainerStatus, error) {
544 ep := arvados.EndpointContainerRequestContainerStatus
545 var resp arvados.ContainerStatus
546 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
550 func (conn *Conn) ContainerRequestLog(ctx context.Context, options arvados.ContainerLogOptions) (resp http.Handler, err error) {
551 proxy := &httputil.ReverseProxy{
552 Transport: conn.httpClient.Transport,
553 Director: func(r *http.Request) {
556 u.RawQuery = fmt.Sprintf("no_forward=%v", options.NoForward)
563 func (conn *Conn) GroupCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Group, error) {
564 ep := arvados.EndpointGroupCreate
565 var resp arvados.Group
566 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
570 func (conn *Conn) GroupUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.Group, error) {
571 ep := arvados.EndpointGroupUpdate
572 var resp arvados.Group
573 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
577 func (conn *Conn) GroupGet(ctx context.Context, options arvados.GetOptions) (arvados.Group, error) {
578 ep := arvados.EndpointGroupGet
579 var resp arvados.Group
580 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
584 func (conn *Conn) GroupList(ctx context.Context, options arvados.ListOptions) (arvados.GroupList, error) {
585 ep := arvados.EndpointGroupList
586 var resp arvados.GroupList
587 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
591 func (conn *Conn) GroupContents(ctx context.Context, options arvados.GroupContentsOptions) (arvados.ObjectList, error) {
592 ep := arvados.EndpointGroupContents
593 var resp arvados.ObjectList
594 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
598 func (conn *Conn) GroupShared(ctx context.Context, options arvados.ListOptions) (arvados.GroupList, error) {
599 ep := arvados.EndpointGroupShared
600 var resp arvados.GroupList
601 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
605 func (conn *Conn) GroupDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.Group, error) {
606 ep := arvados.EndpointGroupDelete
607 var resp arvados.Group
608 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
612 func (conn *Conn) GroupTrash(ctx context.Context, options arvados.DeleteOptions) (arvados.Group, error) {
613 ep := arvados.EndpointGroupTrash
614 var resp arvados.Group
615 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
619 func (conn *Conn) GroupUntrash(ctx context.Context, options arvados.UntrashOptions) (arvados.Group, error) {
620 ep := arvados.EndpointGroupUntrash
621 var resp arvados.Group
622 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
626 func (conn *Conn) LinkCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Link, error) {
627 ep := arvados.EndpointLinkCreate
628 var resp arvados.Link
629 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
633 func (conn *Conn) LinkUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.Link, error) {
634 ep := arvados.EndpointLinkUpdate
635 var resp arvados.Link
636 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
640 func (conn *Conn) LinkGet(ctx context.Context, options arvados.GetOptions) (arvados.Link, error) {
641 ep := arvados.EndpointLinkGet
642 var resp arvados.Link
643 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
647 func (conn *Conn) LinkList(ctx context.Context, options arvados.ListOptions) (arvados.LinkList, error) {
648 ep := arvados.EndpointLinkList
649 var resp arvados.LinkList
650 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
654 func (conn *Conn) LinkDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.Link, error) {
655 ep := arvados.EndpointLinkDelete
656 var resp arvados.Link
657 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
661 func (conn *Conn) LogCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Log, error) {
662 ep := arvados.EndpointLogCreate
664 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
668 func (conn *Conn) LogUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.Log, error) {
669 ep := arvados.EndpointLogUpdate
671 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
675 func (conn *Conn) LogGet(ctx context.Context, options arvados.GetOptions) (arvados.Log, error) {
676 ep := arvados.EndpointLogGet
678 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
682 func (conn *Conn) LogList(ctx context.Context, options arvados.ListOptions) (arvados.LogList, error) {
683 ep := arvados.EndpointLogList
684 var resp arvados.LogList
685 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
689 func (conn *Conn) LogDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.Log, error) {
690 ep := arvados.EndpointLogDelete
692 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
696 func (conn *Conn) SysTrashSweep(ctx context.Context, options struct{}) (struct{}, error) {
697 ep := arvados.EndpointSysTrashSweep
699 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
703 func (conn *Conn) UserCreate(ctx context.Context, options arvados.CreateOptions) (arvados.User, error) {
704 ep := arvados.EndpointUserCreate
705 var resp arvados.User
706 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
709 func (conn *Conn) UserUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.User, error) {
710 ep := arvados.EndpointUserUpdate
711 var resp arvados.User
712 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
715 func (conn *Conn) UserMerge(ctx context.Context, options arvados.UserMergeOptions) (arvados.User, error) {
716 ep := arvados.EndpointUserMerge
717 var resp arvados.User
718 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
721 func (conn *Conn) UserActivate(ctx context.Context, options arvados.UserActivateOptions) (arvados.User, error) {
722 ep := arvados.EndpointUserActivate
723 var resp arvados.User
724 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
727 func (conn *Conn) UserSetup(ctx context.Context, options arvados.UserSetupOptions) (map[string]interface{}, error) {
728 ep := arvados.EndpointUserSetup
729 var resp map[string]interface{}
730 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
733 func (conn *Conn) UserUnsetup(ctx context.Context, options arvados.GetOptions) (arvados.User, error) {
734 ep := arvados.EndpointUserUnsetup
735 var resp arvados.User
736 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
739 func (conn *Conn) UserGet(ctx context.Context, options arvados.GetOptions) (arvados.User, error) {
740 ep := arvados.EndpointUserGet
741 var resp arvados.User
742 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
745 func (conn *Conn) UserGetCurrent(ctx context.Context, options arvados.GetOptions) (arvados.User, error) {
746 ep := arvados.EndpointUserGetCurrent
747 var resp arvados.User
748 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
751 func (conn *Conn) UserGetSystem(ctx context.Context, options arvados.GetOptions) (arvados.User, error) {
752 ep := arvados.EndpointUserGetSystem
753 var resp arvados.User
754 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
757 func (conn *Conn) UserList(ctx context.Context, options arvados.ListOptions) (arvados.UserList, error) {
758 ep := arvados.EndpointUserList
759 var resp arvados.UserList
760 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
763 func (conn *Conn) UserDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.User, error) {
764 ep := arvados.EndpointUserDelete
765 var resp arvados.User
766 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
770 func (conn *Conn) APIClientAuthorizationCurrent(ctx context.Context, options arvados.GetOptions) (arvados.APIClientAuthorization, error) {
771 ep := arvados.EndpointAPIClientAuthorizationCurrent
772 var resp arvados.APIClientAuthorization
773 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
776 func (conn *Conn) APIClientAuthorizationCreate(ctx context.Context, options arvados.CreateOptions) (arvados.APIClientAuthorization, error) {
777 ep := arvados.EndpointAPIClientAuthorizationCreate
778 var resp arvados.APIClientAuthorization
779 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
782 func (conn *Conn) APIClientAuthorizationUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.APIClientAuthorization, error) {
783 ep := arvados.EndpointAPIClientAuthorizationUpdate
784 var resp arvados.APIClientAuthorization
785 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
788 func (conn *Conn) APIClientAuthorizationDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.APIClientAuthorization, error) {
789 ep := arvados.EndpointAPIClientAuthorizationDelete
790 var resp arvados.APIClientAuthorization
791 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
794 func (conn *Conn) APIClientAuthorizationList(ctx context.Context, options arvados.ListOptions) (arvados.APIClientAuthorizationList, error) {
795 ep := arvados.EndpointAPIClientAuthorizationList
796 var resp arvados.APIClientAuthorizationList
797 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
800 func (conn *Conn) APIClientAuthorizationGet(ctx context.Context, options arvados.GetOptions) (arvados.APIClientAuthorization, error) {
801 ep := arvados.EndpointAPIClientAuthorizationGet
802 var resp arvados.APIClientAuthorization
803 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
807 type UserSessionAuthInfo struct {
808 UserUUID string `json:"user_uuid"`
809 Email string `json:"email"`
810 AlternateEmails []string `json:"alternate_emails"`
811 FirstName string `json:"first_name"`
812 LastName string `json:"last_name"`
813 Username string `json:"username"`
814 ExpiresAt time.Time `json:"expires_at"`
817 type UserSessionCreateOptions struct {
818 AuthInfo UserSessionAuthInfo `json:"auth_info"`
819 ReturnTo string `json:"return_to"`
822 func (conn *Conn) UserSessionCreate(ctx context.Context, options UserSessionCreateOptions) (arvados.LoginResponse, error) {
823 ep := arvados.APIEndpoint{Method: "POST", Path: "auth/controller/callback"}
824 var resp arvados.LoginResponse
825 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
829 func (conn *Conn) UserBatchUpdate(ctx context.Context, options arvados.UserBatchUpdateOptions) (arvados.UserList, error) {
830 ep := arvados.EndpointUserBatchUpdate
831 var resp arvados.UserList
832 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
836 func (conn *Conn) UserAuthenticate(ctx context.Context, options arvados.UserAuthenticateOptions) (arvados.APIClientAuthorization, error) {
837 ep := arvados.EndpointUserAuthenticate
838 var resp arvados.APIClientAuthorization
839 err := conn.requestAndDecode(ctx, &resp, ep, nil, options)
843 // httpStatusError is an error with an HTTP status code that can be
844 // propagated by lib/controller/router, etc.
845 type httpStatusError interface {
850 // wrappedHTTPStatusError is used to augment/replace an error message
851 // while preserving the HTTP status code indicated by the original
853 type wrappedHTTPStatusError struct {
858 func wrapHTTPStatusError(err httpStatusError, message string) httpStatusError {
859 return wrappedHTTPStatusError{err, message}
862 func (err wrappedHTTPStatusError) Error() string {