Check(ctx context.Context, uuid string) (bool, error)
}
-func newPermChecker(ac arvados.Client) permChecker {
- ac.AuthToken = ""
+func newPermChecker(ac *arvados.Client) permChecker {
return &cachingPermChecker{
- Client: &ac,
+ ac: ac,
+ token: "-",
cache: make(map[string]cacheEnt),
maxCurrent: 16,
}
}
type cachingPermChecker struct {
- *arvados.Client
+ ac *arvados.Client
+ token string
cache map[string]cacheEnt
maxCurrent int
}
func (pc *cachingPermChecker) SetToken(token string) {
- if pc.Client.AuthToken == token {
+ if pc.token == token {
return
}
- pc.Client.AuthToken = token
+ pc.token = token
pc.cache = make(map[string]cacheEnt)
}
func (pc *cachingPermChecker) Check(ctx context.Context, uuid string) (bool, error) {
pc.nChecks++
logger := ctxlog.FromContext(ctx).
- WithField("token", pc.Client.AuthToken).
+ WithField("token", pc.token).
WithField("uuid", uuid)
pc.tidy()
now := time.Now()
logger.WithField("allowed", perm.allowed).Debug("cache hit")
return perm.allowed, nil
}
- var buf map[string]interface{}
- path, err := pc.PathForUUID("get", uuid)
+
+ path, err := pc.ac.PathForUUID("get", uuid)
if err != nil {
pc.nInvalid++
return false, err
}
pc.nMisses++
- ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(time.Minute))
+ ctx = arvados.ContextWithAuthorization(ctx, "Bearer "+pc.token)
+ ctx, cancel := context.WithDeadline(ctx, time.Now().Add(time.Minute))
defer cancel()
- err = pc.RequestAndDecodeContext(ctx, &buf, "GET", path, nil, url.Values{
+ var buf map[string]interface{}
+ err = pc.ac.RequestAndDecodeContext(ctx, &buf, "GET", path, nil, url.Values{
"include_trash": {"true"},
"select": {`["uuid"]`},
})
} else if txErr, ok := err.(*arvados.TransactionError); ok && pc.isNotAllowed(txErr.StatusCode) {
allowed = false
} else {
+ // If "context deadline exceeded", "client
+ // disconnected", HTTP 5xx, network error, etc., don't
+ // cache the result.
logger.WithError(err).Error("lookup error")
return false, err
}