X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/d9fdb9630e56f3ccdaee6acd8b1ca4cdbdf11b0a..HEAD:/lib/controller/rpc/conn.go diff --git a/lib/controller/rpc/conn.go b/lib/controller/rpc/conn.go index 70a936a6f6..3125ae29be 100644 --- a/lib/controller/rpc/conn.go +++ b/lib/controller/rpc/conn.go @@ -20,6 +20,7 @@ import ( "net/url" "strconv" "strings" + "sync" "time" "git.arvados.org/arvados.git/sdk/go/arvados" @@ -44,10 +45,13 @@ type Conn struct { SendHeader http.Header RedactHostInErrors bool - clusterID string - httpClient http.Client - baseURL url.URL - tokenProvider TokenProvider + clusterID string + httpClient http.Client + baseURL url.URL + tokenProvider TokenProvider + discoveryDocument *arvados.DiscoveryDocument + discoveryDocumentMtx sync.Mutex + discoveryDocumentExpires time.Time } func NewConn(clusterID string, url *url.URL, insecure bool, tp TokenProvider) *Conn { @@ -146,10 +150,13 @@ func (conn *Conn) requestAndDecode(ctx context.Context, dst interface{}, ep arva } if len(tokens) > 1 { + if params == nil { + params = make(map[string]interface{}) + } params["reader_tokens"] = tokens[1:] } path := ep.Path - if strings.Contains(ep.Path, "/{uuid}") { + if strings.Contains(ep.Path, "/{uuid}") && params != nil { uuid, _ := params["uuid"].(string) path = strings.Replace(path, "/{uuid}", "/"+uuid, 1) delete(params, "uuid") @@ -189,6 +196,22 @@ func (conn *Conn) VocabularyGet(ctx context.Context) (arvados.Vocabulary, error) return resp, err } +func (conn *Conn) DiscoveryDocument(ctx context.Context) (arvados.DiscoveryDocument, error) { + conn.discoveryDocumentMtx.Lock() + defer conn.discoveryDocumentMtx.Unlock() + if conn.discoveryDocument != nil && time.Now().Before(conn.discoveryDocumentExpires) { + return *conn.discoveryDocument, nil + } + var dd arvados.DiscoveryDocument + err := conn.requestAndDecode(ctx, &dd, arvados.EndpointDiscoveryDocument, nil, nil) + if err != nil { + return dd, err + } + conn.discoveryDocument = &dd + conn.discoveryDocumentExpires = time.Now().Add(time.Hour) + return *conn.discoveryDocument, nil +} + func (conn *Conn) Login(ctx context.Context, options arvados.LoginOptions) (arvados.LoginResponse, error) { ep := arvados.EndpointLogin var resp arvados.LoginResponse @@ -220,6 +243,41 @@ func (conn *Conn) relativeToBaseURL(location string) string { return location } +func (conn *Conn) AuthorizedKeyCreate(ctx context.Context, options arvados.CreateOptions) (arvados.AuthorizedKey, error) { + ep := arvados.EndpointAuthorizedKeyCreate + var resp arvados.AuthorizedKey + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + +func (conn *Conn) AuthorizedKeyUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.AuthorizedKey, error) { + ep := arvados.EndpointAuthorizedKeyUpdate + var resp arvados.AuthorizedKey + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + +func (conn *Conn) AuthorizedKeyGet(ctx context.Context, options arvados.GetOptions) (arvados.AuthorizedKey, error) { + ep := arvados.EndpointAuthorizedKeyGet + var resp arvados.AuthorizedKey + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + +func (conn *Conn) AuthorizedKeyList(ctx context.Context, options arvados.ListOptions) (arvados.AuthorizedKeyList, error) { + ep := arvados.EndpointAuthorizedKeyList + var resp arvados.AuthorizedKeyList + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + +func (conn *Conn) AuthorizedKeyDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.AuthorizedKey, error) { + ep := arvados.EndpointAuthorizedKeyDelete + var resp arvados.AuthorizedKey + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + func (conn *Conn) CollectionCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Collection, error) { ep := arvados.EndpointCollectionCreate var resp arvados.Collection @@ -339,19 +397,6 @@ func (conn *Conn) ContainerUnlock(ctx context.Context, options arvados.GetOption return resp, err } -func (conn *Conn) ContainerLog(ctx context.Context, options arvados.ContainerLogOptions) (resp http.Handler, err error) { - proxy := &httputil.ReverseProxy{ - Transport: conn.httpClient.Transport, - Director: func(r *http.Request) { - u := conn.baseURL - u.Path = r.URL.Path - u.RawQuery = fmt.Sprintf("no_forward=%v", options.NoForward) - r.URL = &u - }, - } - return proxy, nil -} - // ContainerSSH returns a connection to the out-of-band SSH server for // a running container. If the returned error is nil, the caller is // responsible for closing sshconn.Conn. @@ -437,11 +482,11 @@ func (conn *Conn) socket(ctx context.Context, u *url.URL, upgradeHeader string, } else { message = fmt.Sprintf("%q", body) } - return connresp, fmt.Errorf("server did not provide a tunnel: %s: %s", resp.Status, message) + return connresp, httpserver.ErrorWithStatus(fmt.Errorf("server did not provide a tunnel: %s: %s", resp.Status, message), resp.StatusCode) } if strings.ToLower(resp.Header.Get("Upgrade")) != upgradeHeader || strings.ToLower(resp.Header.Get("Connection")) != "upgrade" { - return connresp, fmt.Errorf("bad response from server: Upgrade %q Connection %q", resp.Header.Get("Upgrade"), resp.Header.Get("Connection")) + return connresp, httpserver.ErrorWithStatus(fmt.Errorf("bad response from server: Upgrade %q Connection %q", resp.Header.Get("Upgrade"), resp.Header.Get("Connection")), http.StatusBadGateway) } connresp.Conn = netconn connresp.Bufrw = &bufio.ReadWriter{Reader: bufr, Writer: bufw} @@ -484,6 +529,26 @@ func (conn *Conn) ContainerRequestDelete(ctx context.Context, options arvados.De return resp, err } +func (conn *Conn) ContainerRequestContainerStatus(ctx context.Context, options arvados.GetOptions) (arvados.ContainerStatus, error) { + ep := arvados.EndpointContainerRequestContainerStatus + var resp arvados.ContainerStatus + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + +func (conn *Conn) ContainerRequestLog(ctx context.Context, options arvados.ContainerLogOptions) (resp http.Handler, err error) { + proxy := &httputil.ReverseProxy{ + Transport: conn.httpClient.Transport, + Director: func(r *http.Request) { + u := conn.baseURL + u.Path = r.URL.Path + u.RawQuery = fmt.Sprintf("no_forward=%v", options.NoForward) + r.URL = &u + }, + } + return proxy, nil +} + func (conn *Conn) GroupCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Group, error) { ep := arvados.EndpointGroupCreate var resp arvados.Group @@ -617,41 +682,6 @@ func (conn *Conn) LogDelete(ctx context.Context, options arvados.DeleteOptions) return resp, err } -func (conn *Conn) SpecimenCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Specimen, error) { - ep := arvados.EndpointSpecimenCreate - var resp arvados.Specimen - err := conn.requestAndDecode(ctx, &resp, ep, nil, options) - return resp, err -} - -func (conn *Conn) SpecimenUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.Specimen, error) { - ep := arvados.EndpointSpecimenUpdate - var resp arvados.Specimen - err := conn.requestAndDecode(ctx, &resp, ep, nil, options) - return resp, err -} - -func (conn *Conn) SpecimenGet(ctx context.Context, options arvados.GetOptions) (arvados.Specimen, error) { - ep := arvados.EndpointSpecimenGet - var resp arvados.Specimen - err := conn.requestAndDecode(ctx, &resp, ep, nil, options) - return resp, err -} - -func (conn *Conn) SpecimenList(ctx context.Context, options arvados.ListOptions) (arvados.SpecimenList, error) { - ep := arvados.EndpointSpecimenList - var resp arvados.SpecimenList - err := conn.requestAndDecode(ctx, &resp, ep, nil, options) - return resp, err -} - -func (conn *Conn) SpecimenDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.Specimen, error) { - ep := arvados.EndpointSpecimenDelete - var resp arvados.Specimen - err := conn.requestAndDecode(ctx, &resp, ep, nil, options) - return resp, err -} - func (conn *Conn) SysTrashSweep(ctx context.Context, options struct{}) (struct{}, error) { ep := arvados.EndpointSysTrashSweep var resp struct{}