Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ID-822 Use new Sam endpoint for Signed URLs #77

Merged
merged 5 commits into from
Oct 4, 2023

Conversation

tlangs
Copy link
Contributor

@tlangs tlangs commented Sep 27, 2023

A new Signed URL Endpoint is being created in Sam to correctly handle signed urls for requester-pays buckets. DRSHub should use it.

broadinstitute/sam#1193

@codecov
Copy link

codecov bot commented Sep 27, 2023

Codecov Report

All modified lines are covered by tests ✅

Comparison is base (d90637b) 84.17% compared to head (8d9b0bd) 84.13%.

Additional details and impacted files
@@             Coverage Diff              @@
##                dev      #77      +/-   ##
============================================
- Coverage     84.17%   84.13%   -0.04%     
  Complexity      228      228              
============================================
  Files            36       36              
  Lines           809      807       -2     
  Branches         75       75              
============================================
- Hits            681      679       -2     
  Misses           96       96              
  Partials         32       32              
Files Coverage Δ
...in/java/bio/terra/drshub/services/AuthService.java 84.82% <100.00%> (-0.27%) ⬇️
...va/bio/terra/drshub/services/SignedUrlService.java 93.93% <100.00%> (ø)

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

@tlangs
Copy link
Contributor Author

tlangs commented Sep 27, 2023

Integration test is expected to fail until broadinstitute/sam#1193 ships

Copy link
Contributor

@nmalfroy nmalfroy left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same comment about the UI PR: I have my doubts about the API

post:
summary: gets a signed url for a blob using the pet service account for the user in the provided project
summary: gets a signed url for a blob using the arbitrary pet service account for the user and an optional requester pays google project
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Again, I'd love to understand why it needs to be arbitrary. The project should get passed in by the client. I worry this will cause permissions issues

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Removed all references to Pet Service Accounts

@@ -95,7 +95,7 @@ public static void setupDrsResolutionServiceMocks(
any(BearerToken.class),
eq(true),
nullable(String.class),
nullable(String.class));
eq(googleProject));
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm like 90% sure this is causing the tests to fail

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It totes was.

@sonarcloud
Copy link

sonarcloud bot commented Oct 2, 2023

Kudos, SonarCloud Quality Gate passed!    Quality Gate passed

Bug A 0 Bugs
Vulnerability A 0 Vulnerabilities
Security Hotspot A 0 Security Hotspots
Code Smell A 1 Code Smell

0.0% 0.0% Coverage
0.0% 0.0% Duplication

@tlangs tlangs merged commit 9ab743c into dev Oct 4, 2023
13 of 14 checks passed
@tlangs tlangs deleted the tl_ID-822_requester_pays_signed_urls branch October 4, 2023 11:59
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants