X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/f1f74069850d8c5e987ef7d7fc246735ff94d58d..ab832f5a22db3debbd13cacbee9cf69d68d7075c:/lib/controller/rpc/conn.go diff --git a/lib/controller/rpc/conn.go b/lib/controller/rpc/conn.go index 1475a5e01f..9856eb5760 100644 --- a/lib/controller/rpc/conn.go +++ b/lib/controller/rpc/conn.go @@ -16,6 +16,7 @@ import ( "io/ioutil" "net" "net/http" + "net/http/httputil" "net/url" "strconv" "strings" @@ -88,6 +89,8 @@ func (conn *Conn) requestAndDecode(ctx context.Context, dst interface{}, ep arva Scheme: conn.baseURL.Scheme, APIHost: conn.baseURL.Host, SendHeader: conn.SendHeader, + // Disable auto-retry + Timeout: 0, } tokens, err := conn.tokenProvider(ctx) if err != nil { @@ -294,6 +297,13 @@ func (conn *Conn) ContainerUpdate(ctx context.Context, options arvados.UpdateOpt return resp, err } +func (conn *Conn) ContainerPriorityUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.Container, error) { + ep := arvados.EndpointContainerPriorityUpdate + var resp arvados.Container + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + func (conn *Conn) ContainerGet(ctx context.Context, options arvados.GetOptions) (arvados.Container, error) { ep := arvados.EndpointContainerGet var resp arvados.Container @@ -329,11 +339,31 @@ func (conn *Conn) ContainerUnlock(ctx context.Context, options arvados.GetOption return resp, err } +func (conn *Conn) ContainerLog(ctx context.Context, options arvados.ContainerLogOptions) (resp http.Handler, err error) { + tokens, err := conn.tokenProvider(ctx) + if err != nil { + return nil, err + } else if len(tokens) < 1 { + return nil, httpserver.ErrorWithStatus(errors.New("unauthorized"), http.StatusUnauthorized) + } + proxy := &httputil.ReverseProxy{ + Transport: conn.httpClient.Transport, + Director: func(r *http.Request) { + u := conn.baseURL + u.Path = r.URL.Path + u.RawQuery = fmt.Sprintf("no_forward=%v", options.NoForward) + r.URL = &u + r.Header.Set("Authorization", "Bearer "+tokens[0]) + }, + } + return proxy, nil +} + // ContainerSSH returns a connection to the out-of-band SSH server for // a running container. If the returned error is nil, the caller is // responsible for closing sshconn.Conn. func (conn *Conn) ContainerSSH(ctx context.Context, options arvados.ContainerSSHOptions) (sshconn arvados.ConnectionResponse, err error) { - u, err := conn.baseURL.Parse("/" + strings.Replace(arvados.EndpointContainerSSH.Path, "{uuid}", options.UUID, -1)) + u, err := conn.baseURL.Parse("/" + strings.Replace(arvados.EndpointContainerSSHCompat.Path, "{uuid}", options.UUID, -1)) if err != nil { err = fmt.Errorf("url.Parse: %w", err) return @@ -349,7 +379,7 @@ func (conn *Conn) ContainerSSH(ctx context.Context, options arvados.ContainerSSH // the controller. The caller should connect the returned resp.Conn to // a client-side yamux session. func (conn *Conn) ContainerGatewayTunnel(ctx context.Context, options arvados.ContainerGatewayTunnelOptions) (tunnelconn arvados.ConnectionResponse, err error) { - u, err := conn.baseURL.Parse("/" + strings.Replace(arvados.EndpointContainerGatewayTunnel.Path, "{uuid}", options.UUID, -1)) + u, err := conn.baseURL.Parse("/" + strings.Replace(arvados.EndpointContainerGatewayTunnelCompat.Path, "{uuid}", options.UUID, -1)) if err != nil { err = fmt.Errorf("url.Parse: %w", err) return @@ -414,7 +444,7 @@ func (conn *Conn) socket(ctx context.Context, u *url.URL, upgradeHeader string, } else { message = fmt.Sprintf("%q", body) } - return connresp, fmt.Errorf("server did not provide a tunnel: %s %s", resp.Status, message) + return connresp, fmt.Errorf("server did not provide a tunnel: %s: %s", resp.Status, message) } if strings.ToLower(resp.Header.Get("Upgrade")) != upgradeHeader || strings.ToLower(resp.Header.Get("Connection")) != "upgrade" { @@ -559,6 +589,41 @@ func (conn *Conn) LinkDelete(ctx context.Context, options arvados.DeleteOptions) return resp, err } +func (conn *Conn) LogCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Log, error) { + ep := arvados.EndpointLogCreate + var resp arvados.Log + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + +func (conn *Conn) LogUpdate(ctx context.Context, options arvados.UpdateOptions) (arvados.Log, error) { + ep := arvados.EndpointLogUpdate + var resp arvados.Log + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + +func (conn *Conn) LogGet(ctx context.Context, options arvados.GetOptions) (arvados.Log, error) { + ep := arvados.EndpointLogGet + var resp arvados.Log + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + +func (conn *Conn) LogList(ctx context.Context, options arvados.ListOptions) (arvados.LogList, error) { + ep := arvados.EndpointLogList + var resp arvados.LogList + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + +func (conn *Conn) LogDelete(ctx context.Context, options arvados.DeleteOptions) (arvados.Log, error) { + ep := arvados.EndpointLogDelete + var resp arvados.Log + err := conn.requestAndDecode(ctx, &resp, ep, nil, options) + return resp, err +} + func (conn *Conn) SpecimenCreate(ctx context.Context, options arvados.CreateOptions) (arvados.Specimen, error) { ep := arvados.EndpointSpecimenCreate var resp arvados.Specimen