[ARVADOS] updated: 1.2.0-112-gf451703c7
Git user
git at public.curoverse.com
Fri Sep 28 14:53:13 EDT 2018
Summary of changes:
lib/controller/federation.go | 211 +++++++++++++++++++++++++++-----------
lib/controller/federation_test.go | 174 +++++++++++++++++++++++++++----
sdk/go/arvados/config.go | 16 +--
3 files changed, 313 insertions(+), 88 deletions(-)
via f451703c7c38cb006f468525ea02196b659f3e27 (commit)
via 66496cba45c2b3e9658f12316acb5f8886c90840 (commit)
from 395e42cc2eb11b52ab5e36b29421edcdea3a3dbf (commit)
Those revisions listed above that are new to this repository have
not appeared on any other notification email; so we list those
revisions in full, below.
commit f451703c7c38cb006f468525ea02196b659f3e27
Author: Peter Amstutz <pamstutz at veritasgenetics.com>
Date: Fri Sep 28 14:52:40 2018 -0400
13619: Test error reporting when one of the federates fails
Arvados-DCO-1.1-Signed-off-by: Peter Amstutz <pamstutz at veritasgenetics.com>
diff --git a/lib/controller/federation.go b/lib/controller/federation.go
index 7ea37edf7..1d4844486 100644
--- a/lib/controller/federation.go
+++ b/lib/controller/federation.go
@@ -120,6 +120,7 @@ type multiClusterQueryResponseCollector struct {
responses []interface{}
error error
kind string
+ clusterID string
}
func (c *multiClusterQueryResponseCollector) collectResponse(resp *http.Response,
@@ -128,19 +129,20 @@ func (c *multiClusterQueryResponseCollector) collectResponse(resp *http.Response
c.error = requestError
return nil, nil
}
+
defer resp.Body.Close()
loadInto := make(map[string]interface{})
err = json.NewDecoder(resp.Body).Decode(&loadInto)
if err == nil {
if resp.StatusCode != http.StatusOK {
- c.error = fmt.Errorf("error %v", loadInto["errors"])
+ c.error = fmt.Errorf("error fetching from %v (%v): %v", c.clusterID, resp.Status, loadInto["errors"])
} else {
c.responses = loadInto["items"].([]interface{})
c.kind, _ = loadInto["kind"].(string)
}
} else {
- c.error = err
+ c.error = fmt.Errorf("error fetching from %v (%v): %v", c.clusterID, resp.Status, err)
}
return nil, nil
@@ -170,7 +172,7 @@ func (h *genericFederatedRequestHandler) remoteQueryUUIDs(w http.ResponseWriter,
enc := remoteParams.Encode()
remoteReq.Body = ioutil.NopCloser(bytes.NewBufferString(enc))
- rc := multiClusterQueryResponseCollector{}
+ rc := multiClusterQueryResponseCollector{clusterID: clusterID}
if clusterID == h.handler.Cluster.ClusterID {
h.handler.localClusterRequest(w, &remoteReq,
diff --git a/lib/controller/federation_test.go b/lib/controller/federation_test.go
index 9b0462813..0b62ce5ff 100644
--- a/lib/controller/federation_test.go
+++ b/lib/controller/federation_test.go
@@ -637,6 +637,19 @@ func (s *FederationSuite) TestListMultiRemoteContainers(c *check.C) {
c.Check(mp["zhome-xvhdp-cr5queuedcontnr"].ContainerImage, check.Equals, "")
}
+func (s *FederationSuite) TestListMultiRemoteContainerError(c *check.C) {
+ defer s.localServiceReturns404(c).Close()
+ req := httptest.NewRequest("GET", fmt.Sprintf("/arvados/v1/containers?count=none&filters=%s&select=%s",
+ url.QueryEscape(fmt.Sprintf(`[["uuid", "in", ["%v", "zhome-xvhdp-cr5queuedcontnr"]]]`,
+ arvadostest.QueuedContainerUUID)),
+ url.QueryEscape(`["uuid", "command"]`)),
+ nil)
+ req.Header.Set("Authorization", "Bearer "+arvadostest.ActiveToken)
+ resp := s.testRequest(req)
+ c.Check(resp.StatusCode, check.Equals, http.StatusBadGateway)
+ s.checkJSONErrorMatches(c, resp, `error fetching from zhome \(404 Not Found\): EOF`)
+}
+
func (s *FederationSuite) TestListMultiRemoteContainersPaged(c *check.C) {
callCount := 0
commit 66496cba45c2b3e9658f12316acb5f8886c90840
Author: Peter Amstutz <pamstutz at veritasgenetics.com>
Date: Fri Sep 28 14:32:35 2018 -0400
13619: More tests for paging, error conditions
Arvados-DCO-1.1-Signed-off-by: Peter Amstutz <pamstutz at veritasgenetics.com>
diff --git a/lib/controller/federation.go b/lib/controller/federation.go
index 51c2dbd96..7ea37edf7 100644
--- a/lib/controller/federation.go
+++ b/lib/controller/federation.go
@@ -117,41 +117,108 @@ func loadParamsFromJson(req *http.Request, loadInto interface{}) error {
}
type multiClusterQueryResponseCollector struct {
- mtx sync.Mutex
responses []interface{}
- errors []error
+ error error
kind string
}
func (c *multiClusterQueryResponseCollector) collectResponse(resp *http.Response,
requestError error) (newResponse *http.Response, err error) {
if requestError != nil {
- c.mtx.Lock()
- defer c.mtx.Unlock()
- c.errors = append(c.errors, requestError)
+ c.error = requestError
return nil, nil
}
defer resp.Body.Close()
loadInto := make(map[string]interface{})
err = json.NewDecoder(resp.Body).Decode(&loadInto)
- c.mtx.Lock()
- defer c.mtx.Unlock()
-
if err == nil {
if resp.StatusCode != http.StatusOK {
- c.errors = append(c.errors, fmt.Errorf("error %v", loadInto["errors"]))
+ c.error = fmt.Errorf("error %v", loadInto["errors"])
} else {
- c.responses = append(c.responses, loadInto["items"].([]interface{})...)
- c.kind = loadInto["kind"].(string)
+ c.responses = loadInto["items"].([]interface{})
+ c.kind, _ = loadInto["kind"].(string)
}
} else {
- c.errors = append(c.errors, err)
+ c.error = err
}
return nil, nil
}
+func (h *genericFederatedRequestHandler) remoteQueryUUIDs(w http.ResponseWriter,
+ req *http.Request, params url.Values,
+ clusterID string, uuids []string) (rp []interface{}, kind string, err error) {
+
+ found := make(map[string]bool)
+ for len(uuids) > 0 {
+ var remoteReq http.Request
+ remoteReq.Header = req.Header
+ remoteReq.Method = "POST"
+ remoteReq.URL = &url.URL{Path: req.URL.Path}
+ remoteParams := make(url.Values)
+ remoteParams["_method"] = []string{"GET"}
+ remoteParams["count"] = []string{"none"}
+ if len(params["select"]) != 0 {
+ remoteParams["select"] = params["select"]
+ }
+ content, err := json.Marshal(uuids)
+ if err != nil {
+ return nil, "", err
+ }
+ remoteParams["filters"] = []string{fmt.Sprintf(`[["uuid", "in", %s]]`, content)}
+ enc := remoteParams.Encode()
+ remoteReq.Body = ioutil.NopCloser(bytes.NewBufferString(enc))
+
+ rc := multiClusterQueryResponseCollector{}
+
+ if clusterID == h.handler.Cluster.ClusterID {
+ h.handler.localClusterRequest(w, &remoteReq,
+ rc.collectResponse)
+ } else {
+ h.handler.remoteClusterRequest(clusterID, w, &remoteReq,
+ rc.collectResponse)
+ }
+ if rc.error != nil {
+ return nil, "", rc.error
+ }
+
+ kind = rc.kind
+
+ if len(rc.responses) == 0 {
+ // We got zero responses, no point in doing
+ // another query.
+ return rp, kind, nil
+ }
+
+ rp = append(rp, rc.responses...)
+
+ // Go through the responses and determine what was
+ // returned. If there are remaining items, loop
+ // around and do another request with just the
+ // stragglers.
+ for _, i := range rc.responses {
+ m, ok := i.(map[string]interface{})
+ if ok {
+ uuid, ok := m["uuid"].(string)
+ if ok {
+ found[uuid] = true
+ }
+ }
+ }
+
+ l := []string{}
+ for _, u := range uuids {
+ if !found[u] {
+ l = append(l, u)
+ }
+ }
+ uuids = l
+ }
+
+ return rp, kind, nil
+}
+
func (h *genericFederatedRequestHandler) handleMultiClusterQuery(w http.ResponseWriter, req *http.Request,
params url.Values, clusterId *string) bool {
@@ -164,6 +231,7 @@ func (h *genericFederatedRequestHandler) handleMultiClusterQuery(w http.Response
// Split the list of uuids by prefix
queryClusters := make(map[string][]string)
+ expectCount := 0
for _, f1 := range filters {
if len(f1) != 3 {
return false
@@ -183,12 +251,14 @@ func (h *genericFederatedRequestHandler) handleMultiClusterQuery(w http.Response
*clusterId = u[0:5]
queryClusters[u[0:5]] = append(queryClusters[u[0:5]], u)
}
+ expectCount += len(rhs)
}
} else if op == "=" {
u, ok := f1[2].(string)
if ok {
*clusterId = u[0:5]
queryClusters[u[0:5]] = append(queryClusters[u[0:5]], u)
+ expectCount += 1
}
} else {
return false
@@ -199,11 +269,12 @@ func (h *genericFederatedRequestHandler) handleMultiClusterQuery(w http.Response
}
if len(queryClusters) <= 1 {
- // Did not find a list query to search for uuids
- // across multiple clusters.
+ // Query does not search for uuids across multiple
+ // clusters.
return false
}
+ // Validations
if !(len(params["count"]) == 1 && (params["count"][0] == `none` ||
params["count"][0] == `"none"`)) {
httpserver.Error(w, "Federated multi-object query must have 'count=none'", http.StatusBadRequest)
@@ -213,74 +284,88 @@ func (h *genericFederatedRequestHandler) handleMultiClusterQuery(w http.Response
httpserver.Error(w, "Federated multi-object may not provide 'limit', 'offset' or 'order'.", http.StatusBadRequest)
return true
}
+ if expectCount > h.handler.Cluster.MaxItemsPerResponse {
+ httpserver.Error(w, fmt.Sprintf("Federated multi-object request for %v objects which is more than max page size %v.",
+ expectCount, h.handler.Cluster.MaxItemsPerResponse), http.StatusBadRequest)
+ return true
+ }
+ if len(params["select"]) == 1 {
+ foundUUID := false
+ var selects []interface{}
+ err := json.Unmarshal([]byte(params["select"][0]), &selects)
+ if err != nil {
+ httpserver.Error(w, err.Error(), http.StatusBadRequest)
+ return true
+ }
- wg := sync.WaitGroup{}
+ for _, r := range selects {
+ if r.(string) == "uuid" {
+ foundUUID = true
+ break
+ }
+ }
+ if !foundUUID {
+ httpserver.Error(w, "Federated multi-object request must include 'uuid' in 'select'", http.StatusBadRequest)
+ return true
+ }
+ }
- // use channel as a semaphore to limit it to 4
- // parallel requests at a time
- sem := make(chan bool, 4)
+ // Perform parallel requests to each cluster
+
+ // use channel as a semaphore to limit the number of parallel
+ // requests at a time
+ sem := make(chan bool, h.handler.Cluster.ParallelRemoteRequests)
defer close(sem)
+ wg := sync.WaitGroup{}
+
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
+ mtx := sync.Mutex{}
+ errors := []error{}
+ var completeResponses []interface{}
+ var kind string
- rc := multiClusterQueryResponseCollector{}
for k, v := range queryClusters {
+ if len(v) == 0 {
+ // Nothing to query
+ continue
+ }
+
// blocks until it can put a value into the
// channel (which has a max queue capacity)
sem <- true
wg.Add(1)
go func(k string, v []string) {
- defer func() {
- wg.Done()
- <-sem
- }()
- var remoteReq http.Request
- remoteReq.Header = req.Header
- remoteReq.Method = "POST"
- remoteReq.URL = &url.URL{Path: req.URL.Path}
- remoteParams := make(url.Values)
- remoteParams["_method"] = []string{"GET"}
- remoteParams["count"] = []string{"none"}
- if _, ok := params["select"]; ok {
- remoteParams["select"] = params["select"]
- }
- content, err := json.Marshal(v)
- if err != nil {
- rc.mtx.Lock()
- defer rc.mtx.Unlock()
- rc.errors = append(rc.errors, err)
- return
- }
- remoteParams["filters"] = []string{fmt.Sprintf(`[["uuid", "in", %s]]`, content)}
- enc := remoteParams.Encode()
- remoteReq.Body = ioutil.NopCloser(bytes.NewBufferString(enc))
-
- if k == h.handler.Cluster.ClusterID {
- h.handler.localClusterRequest(w, &remoteReq,
- rc.collectResponse)
+ rp, kn, err := h.remoteQueryUUIDs(w, req, params, k, v)
+ mtx.Lock()
+ if err == nil {
+ completeResponses = append(completeResponses, rp...)
+ kind = kn
} else {
- h.handler.remoteClusterRequest(k, w, &remoteReq,
- rc.collectResponse)
+ errors = append(errors, err)
}
+ mtx.Unlock()
+ wg.Done()
+ <-sem
}(k, v)
}
wg.Wait()
- if len(rc.errors) > 0 {
- // parallel query
+ if len(errors) > 0 {
var strerr []string
- for _, e := range rc.errors {
+ for _, e := range errors {
strerr = append(strerr, e.Error())
}
httpserver.Errors(w, strerr, http.StatusBadGateway)
- } else {
- w.Header().Set("Content-Type", "application/json")
- w.WriteHeader(http.StatusOK)
- itemList := make(map[string]interface{})
- itemList["items"] = rc.responses
- itemList["kind"] = rc.kind
- json.NewEncoder(w).Encode(itemList)
+ return true
}
+ w.Header().Set("Content-Type", "application/json")
+ w.WriteHeader(http.StatusOK)
+ itemList := make(map[string]interface{})
+ itemList["items"] = completeResponses
+ itemList["kind"] = kind
+ json.NewEncoder(w).Encode(itemList)
+
return true
}
@@ -580,9 +665,9 @@ func (h *collectionFederatedRequestHandler) ServeHTTP(w http.ResponseWriter, req
var errors []string
var errorCode int = 404
- // use channel as a semaphore to limit it to 4
- // parallel requests at a time
- sem := make(chan bool, 4)
+ // use channel as a semaphore to limit the number of parallel
+ // requests at a time
+ sem := make(chan bool, h.handler.Cluster.ParallelRemoteRequests)
defer close(sem)
for remoteID := range h.handler.Cluster.RemoteClusters {
// blocks until it can put a value into the
diff --git a/lib/controller/federation_test.go b/lib/controller/federation_test.go
index 6a44c7cbd..9b0462813 100644
--- a/lib/controller/federation_test.go
+++ b/lib/controller/federation_test.go
@@ -63,6 +63,8 @@ func (s *FederationSuite) SetUpTest(c *check.C) {
NodeProfiles: map[string]arvados.NodeProfile{
"*": nodeProfile,
},
+ MaxItemsPerResponse: 1000,
+ ParallelRemoteRequests: 4,
}, NodeProfile: &nodeProfile}
s.testServer = newServerFromIntegrationTestEnv(c)
s.testServer.Server.Handler = httpserver.AddRequestIDs(httpserver.LogRequests(s.log, s.testHandler))
@@ -193,7 +195,7 @@ func (s *FederationSuite) TestOptionsMethod(c *check.C) {
func (s *FederationSuite) TestRemoteWithTokenInQuery(c *check.C) {
req := httptest.NewRequest("GET", "/arvados/v1/workflows/"+strings.Replace(arvadostest.WorkflowWithDefinitionYAMLUUID, "zzzzz-", "zmock-", 1)+"?api_token="+arvadostest.ActiveToken, nil)
s.testRequest(req)
- c.Assert(len(s.remoteMockRequests), check.Equals, 1)
+ c.Assert(s.remoteMockRequests, check.HasLen, 1)
pr := s.remoteMockRequests[0]
// Token is salted and moved from query to Authorization header.
c.Check(pr.URL.String(), check.Not(check.Matches), `.*api_token=.*`)
@@ -204,7 +206,7 @@ func (s *FederationSuite) TestLocalTokenSalted(c *check.C) {
req := httptest.NewRequest("GET", "/arvados/v1/workflows/"+strings.Replace(arvadostest.WorkflowWithDefinitionYAMLUUID, "zzzzz-", "zmock-", 1), nil)
req.Header.Set("Authorization", "Bearer "+arvadostest.ActiveToken)
s.testRequest(req)
- c.Assert(len(s.remoteMockRequests), check.Equals, 1)
+ c.Assert(s.remoteMockRequests, check.HasLen, 1)
pr := s.remoteMockRequests[0]
// The salted token here has a "zzzzz-" UUID instead of a
// "ztest-" UUID because ztest's local database has the
@@ -220,7 +222,7 @@ func (s *FederationSuite) TestRemoteTokenNotSalted(c *check.C) {
req := httptest.NewRequest("GET", "/arvados/v1/workflows/"+strings.Replace(arvadostest.WorkflowWithDefinitionYAMLUUID, "zzzzz-", "zmock-", 1), nil)
req.Header.Set("Authorization", "Bearer "+remoteToken)
s.testRequest(req)
- c.Assert(len(s.remoteMockRequests), check.Equals, 1)
+ c.Assert(s.remoteMockRequests, check.HasLen, 1)
pr := s.remoteMockRequests[0]
c.Check(pr.Header.Get("Authorization"), check.Equals, "Bearer "+remoteToken)
}
@@ -299,7 +301,7 @@ func (s *FederationSuite) checkJSONErrorMatches(c *check.C, resp *http.Response,
var jresp httpserver.ErrorResponse
err := json.NewDecoder(resp.Body).Decode(&jresp)
c.Check(err, check.IsNil)
- c.Assert(len(jresp.Errors), check.Equals, 1)
+ c.Assert(jresp.Errors, check.HasLen, 1)
c.Check(jresp.Errors[0], check.Matches, re)
}
@@ -624,20 +626,141 @@ func (s *FederationSuite) TestListMultiRemoteContainers(c *check.C) {
c.Check(resp.StatusCode, check.Equals, http.StatusOK)
var cn arvados.ContainerList
c.Check(json.NewDecoder(resp.Body).Decode(&cn), check.IsNil)
- if cn.Items[0].UUID == arvadostest.QueuedContainerUUID {
- c.Check(cn.Items[0].Command, check.DeepEquals, []string{"echo", "hello"})
- c.Check(cn.Items[0].ContainerImage, check.Equals, "")
-
- c.Check(cn.Items[1].UUID, check.Equals, "zhome-xvhdp-cr5queuedcontnr")
- c.Check(cn.Items[1].Command, check.DeepEquals, []string{"abc"})
- c.Check(cn.Items[1].ContainerImage, check.Equals, "")
- } else {
- c.Check(cn.Items[0].UUID, check.Equals, "zhome-xvhdp-cr5queuedcontnr")
- c.Check(cn.Items[0].Command, check.DeepEquals, []string{"abc"})
- c.Check(cn.Items[0].ContainerImage, check.Equals, "")
-
- c.Check(cn.Items[1].UUID, check.Equals, arvadostest.QueuedContainerUUID)
- c.Check(cn.Items[1].Command, check.DeepEquals, []string{"echo", "hello"})
- c.Check(cn.Items[1].ContainerImage, check.Equals, "")
+ c.Check(cn.Items, check.HasLen, 2)
+ mp := make(map[string]arvados.Container)
+ for _, cr := range cn.Items {
+ mp[cr.UUID] = cr
}
+ c.Check(mp[arvadostest.QueuedContainerUUID].Command, check.DeepEquals, []string{"echo", "hello"})
+ c.Check(mp[arvadostest.QueuedContainerUUID].ContainerImage, check.Equals, "")
+ c.Check(mp["zhome-xvhdp-cr5queuedcontnr"].Command, check.DeepEquals, []string{"abc"})
+ c.Check(mp["zhome-xvhdp-cr5queuedcontnr"].ContainerImage, check.Equals, "")
+}
+
+func (s *FederationSuite) TestListMultiRemoteContainersPaged(c *check.C) {
+
+ callCount := 0
+ defer s.localServiceHandler(c, http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
+ bd, _ := ioutil.ReadAll(req.Body)
+ if callCount == 0 {
+ c.Check(string(bd), check.Equals, `_method=GET&count=none&filters=%5B%5B%22uuid%22%2C+%22in%22%2C+%5B%22zhome-xvhdp-cr5queuedcontnr%22%2C%22zhome-xvhdp-cr6queuedcontnr%22%5D%5D%5D`)
+ w.WriteHeader(200)
+ w.Write([]byte(`{"kind": "arvados#containerList", "items": [{"uuid": "zhome-xvhdp-cr5queuedcontnr", "command": ["abc"]}]}`))
+ } else if callCount == 1 {
+ c.Check(string(bd), check.Equals, `_method=GET&count=none&filters=%5B%5B%22uuid%22%2C+%22in%22%2C+%5B%22zhome-xvhdp-cr6queuedcontnr%22%5D%5D%5D`)
+ w.WriteHeader(200)
+ w.Write([]byte(`{"kind": "arvados#containerList", "items": [{"uuid": "zhome-xvhdp-cr6queuedcontnr", "command": ["efg"]}]}`))
+ }
+ callCount += 1
+ })).Close()
+ req := httptest.NewRequest("GET", fmt.Sprintf("/arvados/v1/containers?count=none&filters=%s",
+ url.QueryEscape(fmt.Sprintf(`[["uuid", "in", ["%v", "zhome-xvhdp-cr5queuedcontnr", "zhome-xvhdp-cr6queuedcontnr"]]]`,
+ arvadostest.QueuedContainerUUID))),
+ nil)
+ req.Header.Set("Authorization", "Bearer "+arvadostest.ActiveToken)
+ resp := s.testRequest(req)
+ c.Check(resp.StatusCode, check.Equals, http.StatusOK)
+ c.Check(callCount, check.Equals, 2)
+ var cn arvados.ContainerList
+ c.Check(json.NewDecoder(resp.Body).Decode(&cn), check.IsNil)
+ c.Check(cn.Items, check.HasLen, 3)
+ mp := make(map[string]arvados.Container)
+ for _, cr := range cn.Items {
+ mp[cr.UUID] = cr
+ }
+ c.Check(mp[arvadostest.QueuedContainerUUID].Command, check.DeepEquals, []string{"echo", "hello"})
+ c.Check(mp["zhome-xvhdp-cr5queuedcontnr"].Command, check.DeepEquals, []string{"abc"})
+ c.Check(mp["zhome-xvhdp-cr6queuedcontnr"].Command, check.DeepEquals, []string{"efg"})
+}
+
+func (s *FederationSuite) TestListMultiRemoteContainersMissing(c *check.C) {
+
+ callCount := 0
+ defer s.localServiceHandler(c, http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {
+ bd, _ := ioutil.ReadAll(req.Body)
+ if callCount == 0 {
+ c.Check(string(bd), check.Equals, `_method=GET&count=none&filters=%5B%5B%22uuid%22%2C+%22in%22%2C+%5B%22zhome-xvhdp-cr5queuedcontnr%22%2C%22zhome-xvhdp-cr6queuedcontnr%22%5D%5D%5D`)
+ w.WriteHeader(200)
+ w.Write([]byte(`{"kind": "arvados#containerList", "items": [{"uuid": "zhome-xvhdp-cr6queuedcontnr", "command": ["efg"]}]}`))
+ } else if callCount == 1 {
+ c.Check(string(bd), check.Equals, `_method=GET&count=none&filters=%5B%5B%22uuid%22%2C+%22in%22%2C+%5B%22zhome-xvhdp-cr5queuedcontnr%22%5D%5D%5D`)
+ w.WriteHeader(200)
+ w.Write([]byte(`{"kind": "arvados#containerList", "items": []}`))
+ }
+ callCount += 1
+ })).Close()
+ req := httptest.NewRequest("GET", fmt.Sprintf("/arvados/v1/containers?count=none&filters=%s",
+ url.QueryEscape(fmt.Sprintf(`[["uuid", "in", ["%v", "zhome-xvhdp-cr5queuedcontnr", "zhome-xvhdp-cr6queuedcontnr"]]]`,
+ arvadostest.QueuedContainerUUID))),
+ nil)
+ req.Header.Set("Authorization", "Bearer "+arvadostest.ActiveToken)
+ resp := s.testRequest(req)
+ c.Check(resp.StatusCode, check.Equals, http.StatusOK)
+ c.Check(callCount, check.Equals, 2)
+ var cn arvados.ContainerList
+ c.Check(json.NewDecoder(resp.Body).Decode(&cn), check.IsNil)
+ c.Check(cn.Items, check.HasLen, 2)
+ mp := make(map[string]arvados.Container)
+ for _, cr := range cn.Items {
+ mp[cr.UUID] = cr
+ }
+ c.Check(mp[arvadostest.QueuedContainerUUID].Command, check.DeepEquals, []string{"echo", "hello"})
+ c.Check(mp["zhome-xvhdp-cr6queuedcontnr"].Command, check.DeepEquals, []string{"efg"})
+}
+
+func (s *FederationSuite) TestListMultiRemoteContainerPageSizeError(c *check.C) {
+ s.testHandler.Cluster.MaxItemsPerResponse = 1
+ req := httptest.NewRequest("GET", fmt.Sprintf("/arvados/v1/containers?count=none&filters=%s",
+ url.QueryEscape(fmt.Sprintf(`[["uuid", "in", ["%v", "zhome-xvhdp-cr5queuedcontnr"]]]`,
+ arvadostest.QueuedContainerUUID))),
+ nil)
+ req.Header.Set("Authorization", "Bearer "+arvadostest.ActiveToken)
+ resp := s.testRequest(req)
+ c.Check(resp.StatusCode, check.Equals, http.StatusBadRequest)
+ s.checkJSONErrorMatches(c, resp, `Federated multi-object request for 2 objects which is more than max page size 1.`)
+}
+
+func (s *FederationSuite) TestListMultiRemoteContainerLimitError(c *check.C) {
+ req := httptest.NewRequest("GET", fmt.Sprintf("/arvados/v1/containers?count=none&filters=%s&limit=1",
+ url.QueryEscape(fmt.Sprintf(`[["uuid", "in", ["%v", "zhome-xvhdp-cr5queuedcontnr"]]]`,
+ arvadostest.QueuedContainerUUID))),
+ nil)
+ req.Header.Set("Authorization", "Bearer "+arvadostest.ActiveToken)
+ resp := s.testRequest(req)
+ c.Check(resp.StatusCode, check.Equals, http.StatusBadRequest)
+ s.checkJSONErrorMatches(c, resp, `Federated multi-object may not provide 'limit', 'offset' or 'order'.`)
+}
+
+func (s *FederationSuite) TestListMultiRemoteContainerOffsetError(c *check.C) {
+ req := httptest.NewRequest("GET", fmt.Sprintf("/arvados/v1/containers?count=none&filters=%s&offset=1",
+ url.QueryEscape(fmt.Sprintf(`[["uuid", "in", ["%v", "zhome-xvhdp-cr5queuedcontnr"]]]`,
+ arvadostest.QueuedContainerUUID))),
+ nil)
+ req.Header.Set("Authorization", "Bearer "+arvadostest.ActiveToken)
+ resp := s.testRequest(req)
+ c.Check(resp.StatusCode, check.Equals, http.StatusBadRequest)
+ s.checkJSONErrorMatches(c, resp, `Federated multi-object may not provide 'limit', 'offset' or 'order'.`)
+}
+
+func (s *FederationSuite) TestListMultiRemoteContainerOrderError(c *check.C) {
+ req := httptest.NewRequest("GET", fmt.Sprintf("/arvados/v1/containers?count=none&filters=%s&order=uuid",
+ url.QueryEscape(fmt.Sprintf(`[["uuid", "in", ["%v", "zhome-xvhdp-cr5queuedcontnr"]]]`,
+ arvadostest.QueuedContainerUUID))),
+ nil)
+ req.Header.Set("Authorization", "Bearer "+arvadostest.ActiveToken)
+ resp := s.testRequest(req)
+ c.Check(resp.StatusCode, check.Equals, http.StatusBadRequest)
+ s.checkJSONErrorMatches(c, resp, `Federated multi-object may not provide 'limit', 'offset' or 'order'.`)
+}
+
+func (s *FederationSuite) TestListMultiRemoteContainerSelectError(c *check.C) {
+ req := httptest.NewRequest("GET", fmt.Sprintf("/arvados/v1/containers?count=none&filters=%s&select=%s",
+ url.QueryEscape(fmt.Sprintf(`[["uuid", "in", ["%v", "zhome-xvhdp-cr5queuedcontnr"]]]`,
+ arvadostest.QueuedContainerUUID)),
+ url.QueryEscape(`["command"]`)),
+ nil)
+ req.Header.Set("Authorization", "Bearer "+arvadostest.ActiveToken)
+ resp := s.testRequest(req)
+ c.Check(resp.StatusCode, check.Equals, http.StatusBadRequest)
+ s.checkJSONErrorMatches(c, resp, `Federated multi-object request must include 'uuid' in 'select'`)
}
diff --git a/sdk/go/arvados/config.go b/sdk/go/arvados/config.go
index 6edd18418..f309ac7bd 100644
--- a/sdk/go/arvados/config.go
+++ b/sdk/go/arvados/config.go
@@ -51,13 +51,15 @@ func (sc *Config) GetCluster(clusterID string) (*Cluster, error) {
}
type Cluster struct {
- ClusterID string `json:"-"`
- ManagementToken string
- NodeProfiles map[string]NodeProfile
- InstanceTypes InstanceTypeMap
- HTTPRequestTimeout Duration
- RemoteClusters map[string]RemoteCluster
- PostgreSQL PostgreSQL
+ ClusterID string `json:"-"`
+ ManagementToken string
+ NodeProfiles map[string]NodeProfile
+ InstanceTypes InstanceTypeMap
+ HTTPRequestTimeout Duration
+ RemoteClusters map[string]RemoteCluster
+ PostgreSQL PostgreSQL
+ MaxItemsPerResponse int
+ ParallelRemoteRequests int
}
type PostgreSQL struct {
-----------------------------------------------------------------------
hooks/post-receive
--
More information about the arvados-commits
mailing list