@@ -18,80 +18,12 @@ PARALLEL_RUNS=${PARALLEL_RUNS:-$(( ( $(nproc) + 1 ) / 2 ))}
1818# Zenko Version
1919VERSION=$( cat ../../../VERSION | grep -Po ' VERSION="\K[^"]*' )
2020
21- # Zenko Environment
22- ZENKO_ACCOUNT_NAME=" zenko-ctst"
23- # ADMIN_ACCESS_KEY_ID=$(kubectl get secret end2end-management-vault-admin-creds.v1 -o jsonpath='{.data.accessKey}' | base64 -d)
24- # ADMIN_SECRET_ACCESS_KEY=$(kubectl get secret end2end-management-vault-admin-creds.v1 -o jsonpath='{.data.secretKey}' | base64 -d)
25-
26- # STORAGE_MANAGER_USER_NAME="ctst_storage_manager"
27- # STORAGE_ACCOUNT_OWNER_USER_NAME="ctst_storage_account_owner"
28- # DATA_CONSUMER_USER_NAME="ctst_data_consumer"
29- # DATA_ACCESSOR_USER_NAME="ctst_data_accessor"
30-
31- # VAULT_AUTH_HOST="${ZENKO_NAME}-connector-vault-auth-api.default.svc.cluster.local"
32- # ZENKO_PORT="80"
33- # KEYCLOAK_TEST_USER=${OIDC_USERNAME}
34- # KEYCLOAK_TEST_PASSWORD=${OIDC_PASSWORD}
35- # KEYCLOAK_TEST_HOST=${OIDC_HOST}
36- # KEYCLOAK_TEST_PORT="80"
37- # KEYCLOAK_TEST_REALM_NAME=${OIDC_REALM}
38- # KEYCLOAK_TEST_CLIENT_ID=${OIDC_CLIENT_ID}
39- # KEYCLOAK_TEST_GRANT_TYPE="password"
40-
41- # get Zenko service users credentials
42- # BACKBEAT_LCBP_1_CREDS=$(kubectl get secret -l app.kubernetes.io/name=backbeat-lcbp-user-creds,app.kubernetes.io/instance=end2end -o jsonpath='{.items[0].data.backbeat-lifecycle-bp-1\.json}' | base64 -d)
43- # BACKBEAT_LCC_1_CREDS=$(kubectl get secret -l app.kubernetes.io/name=backbeat-lcc-user-creds,app.kubernetes.io/instance=end2end -o jsonpath='{.items[0].data.backbeat-lifecycle-conductor-1\.json}' | base64 -d)
44- # BACKBEAT_LCOP_1_CREDS=$(kubectl get secret -l app.kubernetes.io/name=backbeat-lcop-user-creds,app.kubernetes.io/instance=end2end -o jsonpath='{.items[0].data.backbeat-lifecycle-op-1\.json}' | base64 -d)
45- # BACKBEAT_QP_1_CREDS=$(kubectl get secret -l app.kubernetes.io/name=backbeat-qp-user-creds,app.kubernetes.io/instance=end2end -o jsonpath='{.items[0].data.backbeat-qp-1\.json}' | base64 -d)
46- # SORBET_FWD_2_ACCESSKEY=$(kubectl get secret -l app.kubernetes.io/name=sorbet-fwd-creds,app.kubernetes.io/instance=end2end -o jsonpath='{.items[0].data.accessKey}' | base64 -d)
47- # SORBET_FWD_2_SECRETKEY=$(kubectl get secret -l app.kubernetes.io/name=sorbet-fwd-creds,app.kubernetes.io/instance=end2end -o jsonpath='{.items[0].data.secretKey}' | base64 -d)
48- # SERVICE_USERS_CREDENTIALS=$(echo '{"backbeat-lifecycle-bp-1":'${BACKBEAT_LCBP_1_CREDS}',"backbeat-lifecycle-conductor-1":'${BACKBEAT_LCC_1_CREDS}',"backbeat-lifecycle-op-1":'${BACKBEAT_LCOP_1_CREDS}',"backbeat-qp-1":'${BACKBEAT_QP_1_CREDS}',"sorbet-fwd-2":{"accessKey":"'${SORBET_FWD_2_ACCESSKEY}'","secretKey":"'${SORBET_FWD_2_SECRETKEY}'"}}' | jq -R)
49-
50- # Get KAFKA topics for sorbet
51- # KAFKA_DEAD_LETTER_TOPIC=$(kubectl get secret -l app.kubernetes.io/name=cold-sorbet-config-e2e-azure-archive,app.kubernetes.io/instance=end2end \
52- # -o jsonpath='{.items[0].data.config\.json}' | base64 -di | jq '."kafka-dead-letter-topic"' | cut -d "\"" -f 2)
53-
54- # KAFKA_OBJECT_TASK_TOPIC=$(kubectl get secret -l app.kubernetes.io/name=cold-sorbet-config-e2e-azure-archive,app.kubernetes.io/instance=end2end \
55- # -o jsonpath='{.items[0].data.config\.json}' | base64 -di | jq '."kafka-object-task-topic"' | cut -d "\"" -f 2)
56-
57- # KAFKA_GC_REQUEST_TOPIC=$(kubectl get secret -l app.kubernetes.io/name=cold-sorbet-config-e2e-azure-archive,app.kubernetes.io/instance=end2end \
58- # -o jsonpath='{.items[0].data.config\.json}' | base64 -di | jq '."kafka-gc-request-topic"' | cut -d "\"" -f 2)
59-
60- # Extracting kafka host from bacbeat's config
61- # KAFKA_HOST_PORT=$(kubectl get secret -l app.kubernetes.io/name=backbeat-config,app.kubernetes.io/instance=end2end \
62- # -o jsonpath='{.items[0].data.config\.json}' | base64 -di | jq -r .kafka.hosts)
63- # KAFKA_PORT=${KAFKA_HOST_PORT#*:}
64-
65- # KAFKA_AUTH_HOST="end2end-base-queue-auth-0"
66- # KAFKA_AUTH_HOST_PORT="$KAFKA_AUTH_HOST:$KAFKA_PORT"
67-
68- # TIME_PROGRESSION_FACTOR=$(kubectl get zenko end2end -o jsonpath="{.metadata.annotations.zenko\.io/time-progression-factor}")
69- # ZENKO_INSTANCE_ID=$(kubectl get zenko end2end -o jsonpath='{.status.instanceID}')
70-
71- # Azure archive tests
72- # AZURE_ARCHIVE_ACCESS_TIER="Hot"
73- # AZURE_ARCHIVE_MANIFEST_ACCESS_TIER="Hot"
74-
75- # BACKBEAT_API_HOST=$(kubectl get secret -l app.kubernetes.io/name=connector-cloudserver-config,app.kubernetes.io/instance=end2end -o jsonpath='{.items[0].data.config\.json}' | base64 -di | jq -r .backbeat.host)
76- # BACKBEAT_API_PORT=$(kubectl get secret -l app.kubernetes.io/name=connector-cloudserver-config,app.kubernetes.io/instance=end2end -o jsonpath='{.items[0].data.config\.json}' | base64 -di | jq -r .backbeat.port)
77-
78- KAFKA_CLEANER_INTERVAL=$( kubectl get zenko ${ZENKO_NAME} -o jsonpath=' {.spec.kafkaCleaner.interval}' )
79- # SORBETD_RESTORE_TIMEOUT=$(kubectl get zenko end2end -o jsonpath='{.spec.sorbet.server.azure.restoreTimeout}')
80-
81- # Utilization service
82- # UTILIZATION_SERVICE_HOST=$(kubectl get zenko ${ZENKO_NAME} -o jsonpath='{.spec.scuba.api.ingress.hostname}')
83- # UTILIZATION_SERVICE_PORT="80"
84-
8521# Setting CTST world params
8622WORLD_PARAMETERS=" $( jq -c << EOF
8723{
8824 "NotificationDestinationAuthUsername":"${NOTIF_AUTH_DEST_USERNAME} ",
8925 "NotificationDestinationAuthPassword":"${NOTIF_AUTH_DEST_PASSWORD} ",
90- "KafkaExternalIps": "${KAFKA_EXTERNAL_IP:- } ",
91- "StorageManagerUsername":"ctst_storage_manager",
92- "StorageAccountOwnerUsername":"ctst_storage_account_owner",
93- "DataConsumerUsername":"ctst_data_consumer",
94- "DataAccessorUsername":"ctst_data_accessor",
26+ "KafkaExternalIps": "${KAFKA_EXTERNAL_IP:- } "
9527}
9628EOF
9729) "
@@ -101,15 +33,23 @@ kubectl set env deployment end2end-connector-cloudserver SCUBA_HEALTHCHECK_FREQU
10133kubectl rollout status deployment end2end-connector-cloudserver
10234
10335E2E_IMAGE=$E2E_CTST_IMAGE_NAME :$E2E_IMAGE_TAG
104- POD_NAME=" ${ZENKO_NAME} -ctst-tests"
105- CTST_VERSION=$( sed ' s/.*"cli-testing": ".*#\(.*\)".*/\1/;t;d' ../../../tests/ctst/package.json)
36+ POD_NAME=" end2end-ctst-tests"
10637
10738# Configure keycloak
10839docker run \
109- --rm \
110- --network=host \
111- " ${E2E_IMAGE} " /bin/bash \
112- -c " SUBDOMAIN=${SUBDOMAIN} CONTROL_PLANE_INGRESS_ENDPOINT=${KEYCLOAK_TEST_ENDPOINT} ACCOUNT=${ZENKO_ACCOUNT_NAME} KEYCLOAK_REALM=${KEYCLOAK_TEST_REALM_NAME} STORAGE_MANAGER=ctst_storage_manager STORAGE_ACCOUNT_OWNER=ctst_storage_account_owner DATA_CONSUMER=ctst_data_consumer DATA_ACCESSOR=ctst_data_accessor /ctst/node_modules/cli-testing/bin/seedKeycloak.sh" ; [[ $? -eq 1 ]] && exit 1 || echo ' Keycloak Configured!'
40+ --rm \
41+ --network=host \
42+ " ${E2E_IMAGE} " /bin/bash \
43+ -c " SUBDOMAIN=${SUBDOMAIN} \
44+ CONTROL_PLANE_INGRESS_ENDPOINT=${KEYCLOAK_TEST_ENDPOINT} \
45+ ACCOUNT=${ZENKO_ACCOUNT_NAME} \
46+ KEYCLOAK_REALM=${KEYCLOAK_TEST_REALM_NAME} \
47+ STORAGE_MANAGER=${STORAGE_MANAGER_USER_NAME} \
48+ STORAGE_ACCOUNT_OWNER=${STORAGE_ACCOUNT_OWNER_USER_NAME} \
49+ DATA_CONSUMER=${DATA_CONSUMER_USER_NAME} \
50+ DATA_ACCESSOR=${DATA_ACCESSOR_USER_NAME} \
51+ /ctst/node_modules/cli-testing/bin/seedKeycloak.sh"
52+ [[ $? -eq 1 ]] && exit 1 || echo ' Keycloak Configured!'
11353
11454# Grant access to Kube API (insecure, only for testing)
11555kubectl create clusterrolebinding serviceaccounts-cluster-admin \
@@ -127,8 +67,6 @@ kubectl run $POD_NAME \
12767 --image-pull-policy=IfNotPresent \
12868 $( env_for_kubectl_run) \
12969 --env=TARGET_VERSION=$VERSION \
130- --env=AZURE_BLOB_URL=$AZURE_BACKEND_ENDPOINT \
131- --env=AZURE_QUEUE_URL=$AZURE_BACKEND_QUEUE_ENDPOINT \
13270 --env=VERBOSE=1 \
13371 --env=SDK=true \
13472 --override-type strategic \
0 commit comments