11906: use the same name "ManagementToken" to enable healthcheck in all services
authorradhika <radhika@curoverse.com>
Fri, 28 Jul 2017 14:50:58 +0000 (10:50 -0400)
committerradhika <radhika@curoverse.com>
Fri, 28 Jul 2017 14:50:58 +0000 (10:50 -0400)
Arvados-DCO-1.1-Signed-off-by: Radhika Chippada <radhika@curoverse.com>

apps/workbench/app/controllers/healthcheck_controller.rb
apps/workbench/config/application.default.yml
apps/workbench/test/controllers/healthcheck_controller_test.rb
services/api/app/controllers/arvados/v1/healthcheck_controller.rb
services/api/config/application.default.yml
services/api/test/functional/arvados/v1/healthcheck_controller_test.rb
services/nodemanager/arvnodeman/config.py
services/nodemanager/arvnodeman/status.py
services/nodemanager/tests/test_status.py

index 8cf6b93b518076aaa01123880377db948dca3abd..60043d9024c223558cabc9cfc51a1d2522e6e1f4 100644 (file)
@@ -16,7 +16,7 @@ class HealthcheckController < ApplicationController
   before_filter :check_auth_header
 
   def check_auth_header
-    mgmt_token = Rails.configuration.management_token
+    mgmt_token = Rails.configuration.ManagementToken
     auth_header = request.headers['Authorization']
 
     if !mgmt_token
index 8b9bf15b78b5ba776f83e919f39506f1c2dc8891..9f6c1ed338042764c3f38d506753caab7682350e 100644 (file)
@@ -298,4 +298,4 @@ common:
 
   # Token to be included in all healthcheck requests. Disabled by default.
   # Workbench expects request header of the format "Authorization: Bearer xxx"
-  management_token: false
+  ManagementToken: false
index 9254593dc3354914b391740747440dc07f7eb221..9a63a29e8f9677ec8a53426b374e42d255996c56 100644 (file)
@@ -13,7 +13,7 @@ class HealthcheckControllerTest < ActionController::TestCase
     [true, 'Bearer configuredmanagementtoken', 200, '{"health":"OK"}'],
   ].each do |enabled, header, error_code, error_msg|
     test "ping when #{if enabled then 'enabled' else 'disabled' end} with header '#{header}'" do
-      Rails.configuration.management_token = 'configuredmanagementtoken' if enabled
+      Rails.configuration.ManagementToken = 'configuredmanagementtoken' if enabled
 
       @request.headers['Authorization'] = header
       get :ping
index 3986af9dc347aebe33ccd8fd26ccd4060eccee77..6d55506bb5742cf9be7c183186b60f6479ab5226 100644 (file)
@@ -16,7 +16,7 @@ class Arvados::V1::HealthcheckController < ApplicationController
   before_filter :check_auth_header
 
   def check_auth_header
-    mgmt_token = Rails.configuration.management_token
+    mgmt_token = Rails.configuration.ManagementToken
     auth_header = request.headers['Authorization']
 
     if !mgmt_token
index 8dafd1c2da713caa21ae6e1be392d21b7400be88..2f32556733b1a8a186bc3ad51a540518c485ac57 100644 (file)
@@ -444,7 +444,7 @@ common:
 
   # Token to be included in all healthcheck requests. Disabled by default.
   # Server expects request header of the format "Authorization: Bearer xxx"
-  management_token: false
+  ManagementToken: false
 
 development:
   force_ssl: false
index 282bdf14eb0c3c5b4298927536a1009e541f4f8a..551eefa8787baf10e3507a8d6768484de06fb8df 100644 (file)
@@ -13,7 +13,7 @@ class Arvados::V1::HealthcheckControllerTest < ActionController::TestCase
     [true, 'Bearer configuredmanagementtoken', 200, '{"health":"OK"}'],
   ].each do |enabled, header, error_code, error_msg|
     test "ping when #{if enabled then 'enabled' else 'disabled' end} with header '#{header}'" do
-      Rails.configuration.management_token = 'configuredmanagementtoken' if enabled
+      Rails.configuration.ManagementToken = 'configuredmanagementtoken' if enabled
 
       @request.headers['Authorization'] = header
       get :ping
index 1c7929b0afa81e20828e50a0967bfe397c670b87..e47f9fcb1d036b78f94af0af25e8c37dc17b5ad0 100644 (file)
@@ -59,7 +59,7 @@ class NodeManagerConfig(ConfigParser.SafeConfigParser):
                        'node_mem_scaling': '0.95'},
             'Manage': {'address': '127.0.0.1',
                        'port': '-1',
-                       'management_token': ''},
+                       'ManagementToken': ''},
             'Logging': {'file': '/dev/stderr',
                         'level': 'WARNING'}
         }.iteritems():
index 99b8156f3aa9d58c64c60b1c72698e0ae5c98960..cfd611285cffc91933fefb15a2dee37e14995c7e 100644 (file)
@@ -59,7 +59,7 @@ class Handler(http.server.BaseHTTPRequestHandler, object):
         _logger.info(fmt, *args, **kwargs)
 
     def check_auth(self):
-        mgmt_token = self.server._config.get('Manage', 'management_token')
+        mgmt_token = self.server._config.get('Manage', 'ManagementToken')
         auth_header = self.headers.get('Authorization', None)
 
         if mgmt_token == '':
index 87625116f7e3ac7797e85a7bbac51e7024c07f37..a236e4f0eecd1d2ba30c3e01adc227e245aba03e 100644 (file)
@@ -23,7 +23,7 @@ class TestServer(object):
         cfg.set('Manage', 'port', '0')
         cfg.set('Manage', 'address', '127.0.0.1')
         if self.mgmt_token != None:
-            cfg.set('Manage', 'management_token', self.mgmt_token)
+            cfg.set('Manage', 'ManagementToken', self.mgmt_token)
         self.srv = status.Server(cfg)
         self.srv.start()
         addr, port = self.srv.server_address