X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/5ee93e408c0e547dfb03b2f3d039a7715126395b..f6a29cc714dd3409f865ceb799a886dd0b5d8152:/lib/controller/router/router_test.go diff --git a/lib/controller/router/router_test.go b/lib/controller/router/router_test.go index b1bc9bce32..11b090a214 100644 --- a/lib/controller/router/router_test.go +++ b/lib/controller/router/router_test.go @@ -16,9 +16,9 @@ import ( "testing" "time" - "git.curoverse.com/arvados.git/lib/controller/rpc" - "git.curoverse.com/arvados.git/sdk/go/arvados" - "git.curoverse.com/arvados.git/sdk/go/arvadostest" + "git.arvados.org/arvados.git/lib/controller/rpc" + "git.arvados.org/arvados.git/sdk/go/arvados" + "git.arvados.org/arvados.git/sdk/go/arvadostest" "github.com/gorilla/mux" check "gopkg.in/check.v1" ) @@ -38,8 +38,8 @@ type RouterSuite struct { func (s *RouterSuite) SetUpTest(c *check.C) { s.stub = arvadostest.APIStub{} s.rtr = &router{ - mux: mux.NewRouter(), - fed: &s.stub, + mux: mux.NewRouter(), + backend: &s.stub, } s.rtr.addRoutes() } @@ -47,6 +47,7 @@ func (s *RouterSuite) SetUpTest(c *check.C) { func (s *RouterSuite) TestOptions(c *check.C) { token := arvadostest.ActiveToken for _, trial := range []struct { + comment string // unparsed -- only used to help match test failures to trials method string path string header http.Header @@ -91,6 +92,12 @@ func (s *RouterSuite) TestOptions(c *check.C) { shouldCall: "CollectionList", withOptions: arvados.ListOptions{Limit: -1}, }, + { + method: "GET", + path: "/arvados/v1/api_client_authorizations", + shouldCall: "APIClientAuthorizationList", + withOptions: arvados.ListOptions{Limit: -1}, + }, { method: "GET", path: "/arvados/v1/collections?limit=123&offset=456&include_trash=true&include_old_versions=1", @@ -104,6 +111,14 @@ func (s *RouterSuite) TestOptions(c *check.C) { shouldCall: "CollectionList", withOptions: arvados.ListOptions{Limit: 123, Offset: 456, IncludeTrash: true, IncludeOldVersions: true}, }, + { + method: "POST", + path: "/arvados/v1/collections?limit=123", + body: `{"offset":456,"include_trash":true,"include_old_versions":true}`, + header: http.Header{"X-Http-Method-Override": {"GET"}, "Content-Type": {"application/json"}}, + shouldCall: "CollectionList", + withOptions: arvados.ListOptions{Limit: 123, Offset: 456, IncludeTrash: true, IncludeOldVersions: true}, + }, { method: "POST", path: "/arvados/v1/collections?limit=123", @@ -112,6 +127,38 @@ func (s *RouterSuite) TestOptions(c *check.C) { shouldCall: "CollectionList", withOptions: arvados.ListOptions{Limit: 123, Offset: 456, IncludeTrash: true, IncludeOldVersions: true}, }, + { + comment: "form-encoded expression filter in query string", + method: "GET", + path: "/arvados/v1/collections?filters=[%22(foo25M body + // is accepted even though the default Go request size + // limit is 10M. + 50000000, + } { + s.rtr.config.MaxRequestSize = maxRequestSize + okstr := "a" + for len(okstr) < maxRequestSize/2 { + okstr = okstr + okstr + } + + hdr := http.Header{"Content-Type": {"application/x-www-form-urlencoded"}} + + body := bytes.NewBufferString(url.Values{"foo_bar": {okstr}}.Encode()) + _, rr, _ := doRequest(c, s.rtr, token, "POST", `/arvados/v1/collections`, hdr, body) + c.Check(rr.Code, check.Equals, http.StatusOK) + + body = bytes.NewBufferString(url.Values{"foo_bar": {okstr + okstr}}.Encode()) + _, rr, _ = doRequest(c, s.rtr, token, "POST", `/arvados/v1/collections`, hdr, body) + c.Check(rr.Code, check.Equals, http.StatusRequestEntityTooLarge) + } +} + func (s *RouterIntegrationSuite) TestContainerList(c *check.C) { token := arvadostest.ActiveTokenV2 @@ -265,7 +342,7 @@ func (s *RouterIntegrationSuite) TestContainerLock(c *check.C) { c.Check(rr.Code, check.Equals, http.StatusOK) c.Check(jresp["uuid"], check.HasLen, 27) c.Check(jresp["state"], check.Equals, "Locked") - _, rr, jresp = doRequest(c, s.rtr, token, "POST", "/arvados/v1/containers/"+uuid+"/lock", nil, nil) + _, rr, _ = doRequest(c, s.rtr, token, "POST", "/arvados/v1/containers/"+uuid+"/lock", nil, nil) c.Check(rr.Code, check.Equals, http.StatusUnprocessableEntity) c.Check(rr.Body.String(), check.Not(check.Matches), `.*"uuid":.*`) _, rr, jresp = doRequest(c, s.rtr, token, "POST", "/arvados/v1/containers/"+uuid+"/unlock", nil, nil) @@ -278,6 +355,12 @@ func (s *RouterIntegrationSuite) TestContainerLock(c *check.C) { c.Check(jresp["uuid"], check.IsNil) } +func (s *RouterIntegrationSuite) TestWritableBy(c *check.C) { + _, rr, jresp := doRequest(c, s.rtr, arvadostest.ActiveTokenV2, "GET", `/arvados/v1/users/`+arvadostest.ActiveUserUUID, nil, nil) + c.Check(rr.Code, check.Equals, http.StatusOK) + c.Check(jresp["writable_by"], check.DeepEquals, []interface{}{"zzzzz-tpzed-000000000000000", "zzzzz-tpzed-xurymjxw79nv3jz", "zzzzz-j7d0g-48foin4vonvc2at"}) +} + func (s *RouterIntegrationSuite) TestFullTimestampsInResponse(c *check.C) { uuid := arvadostest.CollectionReplicationDesired2Confirmed2UUID token := arvadostest.ActiveTokenV2 @@ -302,10 +385,10 @@ func (s *RouterIntegrationSuite) TestFullTimestampsInResponse(c *check.C) { func (s *RouterIntegrationSuite) TestSelectParam(c *check.C) { uuid := arvadostest.QueuedContainerUUID token := arvadostest.ActiveTokenV2 + // GET for _, sel := range [][]string{ {"uuid", "command"}, {"uuid", "command", "uuid"}, - {"", "command", "uuid"}, } { j, err := json.Marshal(sel) c.Assert(err, check.IsNil) @@ -319,6 +402,31 @@ func (s *RouterIntegrationSuite) TestSelectParam(c *check.C) { _, hasMounts := resp["mounts"] c.Check(hasMounts, check.Equals, false) } + // POST & PUT + uuid = arvadostest.FooCollection + j, err := json.Marshal([]string{"uuid", "description"}) + c.Assert(err, check.IsNil) + for _, method := range []string{"PUT", "POST"} { + desc := "Today is " + time.Now().String() + reqBody := "{\"description\":\"" + desc + "\"}" + var resp map[string]interface{} + var rr *httptest.ResponseRecorder + if method == "PUT" { + _, rr, resp = doRequest(c, s.rtr, token, method, "/arvados/v1/collections/"+uuid+"?select="+string(j), nil, bytes.NewReader([]byte(reqBody))) + } else { + _, rr, resp = doRequest(c, s.rtr, token, method, "/arvados/v1/collections?select="+string(j), nil, bytes.NewReader([]byte(reqBody))) + } + c.Check(rr.Code, check.Equals, http.StatusOK) + c.Check(resp["kind"], check.Equals, "arvados#collection") + c.Check(resp["uuid"], check.HasLen, 27) + c.Check(resp["description"], check.Equals, desc) + c.Check(resp["manifest_text"], check.IsNil) + } +} + +func (s *RouterIntegrationSuite) TestHEAD(c *check.C) { + _, rr, _ := doRequest(c, s.rtr, arvadostest.ActiveTokenV2, "HEAD", "/arvados/v1/containers/"+arvadostest.QueuedContainerUUID, nil, nil) + c.Check(rr.Code, check.Equals, http.StatusOK) } func (s *RouterIntegrationSuite) TestRouteNotFound(c *check.C) { @@ -356,7 +464,7 @@ func (s *RouterIntegrationSuite) TestCORS(c *check.C) { for _, hdr := range []string{"Authorization", "Content-Type"} { c.Check(rr.Result().Header.Get("Access-Control-Allow-Headers"), check.Matches, ".*"+hdr+".*") } - for _, method := range []string{"GET", "HEAD", "PUT", "POST", "DELETE"} { + for _, method := range []string{"GET", "HEAD", "PUT", "POST", "PATCH", "DELETE"} { c.Check(rr.Result().Header.Get("Access-Control-Allow-Methods"), check.Matches, ".*"+method+".*") }