@@ -20,18 +20,20 @@ VERSION=$(cat ../../../VERSION | grep -Po 'VERSION="\K[^"]*')
2020
2121# Zenko Environment
2222ZENKO_ACCOUNT_NAME=" zenko-ctst"
23- ADMIN_ACCESS_KEY_ID=$( kubectl get secret end2end-management-vault-admin-creds.v1 -o jsonpath=' {.data.accessKey}' | base64 -d)
24- ADMIN_SECRET_ACCESS_KEY=$( kubectl get secret end2end-management-vault-admin-creds.v1 -o jsonpath=' {.data.secretKey}' | base64 -d)
23+ # ADMIN_ACCESS_KEY_ID=$(kubectl get secret end2end-management-vault-admin-creds.v1 -o jsonpath='{.data.accessKey}' | base64 -d)
24+ # ADMIN_SECRET_ACCESS_KEY=$(kubectl get secret end2end-management-vault-admin-creds.v1 -o jsonpath='{.data.secretKey}' | base64 -d)
2525ADMIN_PRA_ACCESS_KEY_ID=$( kubectl get secret end2end-pra-management-vault-admin-creds.v1 -o jsonpath=' {.data.accessKey}' | base64 -d)
2626ADMIN_PRA_SECRET_ACCESS_KEY=$( kubectl get secret end2end-pra-management-vault-admin-creds.v1 -o jsonpath=' {.data.secretKey}' | base64 -d)
27- STORAGE_MANAGER_USER_NAME=" ctst_storage_manager"
28- STORAGE_ACCOUNT_OWNER_USER_NAME=" ctst_storage_account_owner"
29- DATA_CONSUMER_USER_NAME=" ctst_data_consumer"
30- DATA_ACCESSOR_USER_NAME=" ctst_data_accessor"
27+
28+ # STORAGE_MANAGER_USER_NAME="ctst_storage_manager"
29+ # STORAGE_ACCOUNT_OWNER_USER_NAME="ctst_storage_account_owner"
30+ # DATA_CONSUMER_USER_NAME="ctst_data_consumer"
31+ # DATA_ACCESSOR_USER_NAME="ctst_data_accessor"
32+
3133VAULT_AUTH_HOST=" ${ZENKO_NAME} -connector-vault-auth-api.default.svc.cluster.local"
32- ZENKO_PORT=" 80"
34+ # ZENKO_PORT="80"
3335KEYCLOAK_TEST_USER=${OIDC_USERNAME}
34- KEYCLOAK_TEST_PASSWORD=${OIDC_PASSWORD}
36+ # KEYCLOAK_TEST_PASSWORD=${OIDC_PASSWORD}
3537KEYCLOAK_TEST_HOST=${OIDC_HOST}
3638KEYCLOAK_TEST_PORT=" 80"
3739KEYCLOAK_TEST_REALM_NAME=${OIDC_REALM}
@@ -45,7 +47,7 @@ BACKBEAT_LCOP_1_CREDS=$(kubectl get secret -l app.kubernetes.io/name=backbeat-lc
4547BACKBEAT_QP_1_CREDS=$( kubectl get secret -l app.kubernetes.io/name=backbeat-qp-user-creds,app.kubernetes.io/instance=end2end -o jsonpath=' {.items[0].data.backbeat-qp-1\.json}' | base64 -d)
4648SORBET_FWD_2_ACCESSKEY=$( kubectl get secret -l app.kubernetes.io/name=sorbet-fwd-creds,app.kubernetes.io/instance=end2end -o jsonpath=' {.items[0].data.accessKey}' | base64 -d)
4749SORBET_FWD_2_SECRETKEY=$( kubectl get secret -l app.kubernetes.io/name=sorbet-fwd-creds,app.kubernetes.io/instance=end2end -o jsonpath=' {.items[0].data.secretKey}' | base64 -d)
48- SERVICE_USERS_CREDENTIALS=$( echo ' {"backbeat-lifecycle-bp-1":' ${BACKBEAT_LCBP_1_CREDS} ' ,"backbeat-lifecycle-conductor-1":' ${BACKBEAT_LCC_1_CREDS} ' ,"backbeat-lifecycle-op-1":' ${BACKBEAT_LCOP_1_CREDS} ' ,"backbeat-qp-1":' ${BACKBEAT_QP_1_CREDS} ' ,"sorbet-fwd-2":{"accessKey":"' ${SORBET_FWD_2_ACCESSKEY} ' ","secretKey":"' ${SORBET_FWD_2_SECRETKEY} ' "}}' | jq -R)
50+ # SERVICE_USERS_CREDENTIALS=$(echo '{"backbeat-lifecycle-bp-1":'${BACKBEAT_LCBP_1_CREDS}',"backbeat-lifecycle-conductor-1":'${BACKBEAT_LCC_1_CREDS}',"backbeat-lifecycle-op-1":'${BACKBEAT_LCOP_1_CREDS}',"backbeat-qp-1":'${BACKBEAT_QP_1_CREDS}',"sorbet-fwd-2":{"accessKey":"'${SORBET_FWD_2_ACCESSKEY}'","secretKey":"'${SORBET_FWD_2_SECRETKEY}'"}}' | jq -R)
4951
5052# Get KAFKA topics for sorbet
5153KAFKA_DEAD_LETTER_TOPIC=$( kubectl get secret -l app.kubernetes.io/name=cold-sorbet-config-e2e-azure-archive,app.kubernetes.io/instance=end2end \
@@ -57,8 +59,8 @@ KAFKA_OBJECT_TASK_TOPIC=$(kubectl get secret -l app.kubernetes.io/name=cold-sorb
5759KAFKA_GC_REQUEST_TOPIC=$( kubectl get secret -l app.kubernetes.io/name=cold-sorbet-config-e2e-azure-archive,app.kubernetes.io/instance=end2end \
5860 -o jsonpath=' {.items[0].data.config\.json}' | base64 -di | jq ' ."kafka-gc-request-topic"' | cut -d " \" " -f 2)
5961
60- DR_ADMIN_ACCESS_KEY_ID=$( kubectl get secret end2end-pra-management-vault-admin-creds.v1 -o jsonpath=' {.data.accessKey}' | base64 -d)
61- DR_ADMIN_SECRET_ACCESS_KEY=$( kubectl get secret end2end-pra-management-vault-admin-creds.v1 -o jsonpath=' {.data.secretKey}' | base64 -d)
62+ # DR_ADMIN_ACCESS_KEY_ID=$(kubectl get secret end2end-pra-management-vault-admin-creds.v1 -o jsonpath='{.data.accessKey}' | base64 -d)
63+ # DR_ADMIN_SECRET_ACCESS_KEY=$(kubectl get secret end2end-pra-management-vault-admin-creds.v1 -o jsonpath='{.data.secretKey}' | base64 -d)
6264
6365# Extracting kafka host from bacbeat's config
6466KAFKA_HOST_PORT=$( kubectl get secret -l app.kubernetes.io/name=backbeat-config,app.kubernetes.io/instance=end2end \
@@ -90,13 +92,6 @@ UTILIZATION_SERVICE_PORT="80"
9092# Setting CTST world params
9193WORLD_PARAMETERS=" $( jq -c << EOF
9294{
93- "subdomain":"${SUBDOMAIN} ",
94- "DRSubdomain":"${DR_SUBDOMAIN} ",
95- "ssl":false,
96- "port":"${ZENKO_PORT} ",
97- "AccountName":"${ZENKO_ACCOUNT_NAME} ",
98- "AdminAccessKey":"${ADMIN_ACCESS_KEY_ID} ",
99- "AdminSecretKey":"${ADMIN_SECRET_ACCESS_KEY} ",
10095 "VaultAuthHost":"${VAULT_AUTH_HOST} ",
10196 "NotificationDestination":"${NOTIF_DEST_NAME} ",
10297 "NotificationDestinationTopic":"${NOTIF_DEST_TOPIC} ",
@@ -111,17 +106,15 @@ WORLD_PARAMETERS="$(jq -c <<EOF
111106 "KafkaHosts":"${KAFKA_HOST_PORT} ",
112107 "KafkaAuthHosts":"${KAFKA_AUTH_HOST_PORT} ",
113108 "KeycloakUsername":"${KEYCLOAK_TEST_USER} ",
114- "KeycloakPassword":"${KEYCLOAK_TEST_PASSWORD} ",
115109 "KeycloakHost":"${KEYCLOAK_TEST_HOST} ",
116110 "KeycloakPort":"${KEYCLOAK_TEST_PORT} ",
117- "keycloakRealm":"${KEYCLOAK_TEST_REALM_NAME} ",
118- "keycloakClientId":"${KEYCLOAK_TEST_CLIENT_ID} ",
119- "keycloakGrantType":"${KEYCLOAK_TEST_GRANT_TYPE} ",
120- "StorageManagerUsername":"${STORAGE_MANAGER_USER_NAME} ",
121- "StorageAccountOwnerUsername":"${STORAGE_ACCOUNT_OWNER_USER_NAME} ",
122- "DataConsumerUsername":"${DATA_CONSUMER_USER_NAME} ",
123- "DataAccessorUsername":"${DATA_ACCESSOR_USER_NAME} ",
124- "ServiceUsersCredentials":${SERVICE_USERS_CREDENTIALS} ,
111+ "KeycloakRealm":"${KEYCLOAK_TEST_REALM_NAME} ",
112+ "KeycloakClientId":"${KEYCLOAK_TEST_CLIENT_ID} ",
113+ "KeycloakGrantType":"${KEYCLOAK_TEST_GRANT_TYPE} ",
114+ "StorageManagerUsername":"ctst_storage_manager",
115+ "StorageAccountOwnerUsername":"ctst_storage_account_owner",
116+ "DataConsumerUsername":"ctst_data_consumer",
117+ "DataAccessorUsername":"ctst_data_accessor",
125118 "AzureAccountName":"${AZURE_ACCOUNT_NAME} ",
126119 "AzureAccountKey":"${AZURE_SECRET_KEY} ",
127120 "AzureArchiveContainer":"${AZURE_ARCHIVE_BUCKET_NAME} ",
@@ -139,8 +132,6 @@ WORLD_PARAMETERS="$(jq -c <<EOF
139132 "KafkaCleanerInterval":"${KAFKA_CLEANER_INTERVAL} ",
140133 "SorbetdRestoreTimeout":"${SORBETD_RESTORE_TIMEOUT} ",
141134 "TimeProgressionFactor":"${TIME_PROGRESSION_FACTOR} ",
142- "DRAdminAccessKey":"${DR_ADMIN_ACCESS_KEY_ID} ",
143- "DRAdminSecretKey":"${DR_ADMIN_SECRET_ACCESS_KEY} ",
144135 "UtilizationServiceHost":"${UTILIZATION_SERVICE_HOST} ",
145136 "UtilizationServicePort":"${UTILIZATION_SERVICE_PORT} "
146137}
@@ -160,7 +151,7 @@ docker run \
160151 --rm \
161152 --network=host \
162153 " ${E2E_IMAGE} " /bin/bash \
163- -c " SUBDOMAIN=${SUBDOMAIN} CONTROL_PLANE_INGRESS_ENDPOINT=${OIDC_ENDPOINT} ACCOUNT=${ZENKO_ACCOUNT_NAME} KEYCLOAK_REALM=${KEYCLOAK_TEST_REALM_NAME} STORAGE_MANAGER=${STORAGE_MANAGER_USER_NAME} STORAGE_ACCOUNT_OWNER=${STORAGE_ACCOUNT_OWNER_USER_NAME} DATA_CONSUMER=${DATA_CONSUMER_USER_NAME} DATA_ACCESSOR=${DATA_ACCESSOR_USER_NAME} /ctst/node_modules/cli-testing/bin/seedKeycloak.sh" ; [[ $? -eq 1 ]] && exit 1 || echo ' Keycloak Configured!'
154+ -c " SUBDOMAIN=${SUBDOMAIN} CONTROL_PLANE_INGRESS_ENDPOINT=${OIDC_ENDPOINT} ACCOUNT=${ZENKO_ACCOUNT_NAME} KEYCLOAK_REALM=${KEYCLOAK_TEST_REALM_NAME} STORAGE_MANAGER=ctst_storage_manager STORAGE_ACCOUNT_OWNER=ctst_storage_account_owner DATA_CONSUMER=ctst_data_consumer DATA_ACCESSOR=ctst_data_accessor /ctst/node_modules/cli-testing/bin/seedKeycloak.sh" ; [[ $? -eq 1 ]] && exit 1 || echo ' Keycloak Configured!'
164155
165156# Grant access to Kube API (insecure, only for testing)
166157kubectl create clusterrolebinding serviceaccounts-cluster-admin \
0 commit comments