X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/045e3127cb48845c7d988d01488c055f02ae2ec3..58582ec6765abcbed322d0035eb099a6dde426e5:/tools/salt-install/tests/run-test.sh diff --git a/tools/salt-install/tests/run-test.sh b/tools/salt-install/tests/run-test.sh index 8d9de6fdf0..cf43273a14 100755 --- a/tools/salt-install/tests/run-test.sh +++ b/tools/salt-install/tests/run-test.sh @@ -3,14 +3,14 @@ # # SPDX-License-Identifier: Apache-2.0 -export ARVADOS_API_TOKEN=changemesystemroottoken -export ARVADOS_API_HOST=__CLUSTER__.__DOMAIN__:__HOST_SSL_PORT__ +export ARVADOS_API_TOKEN=__SYSTEM_ROOT_TOKEN__ +export ARVADOS_API_HOST=__CLUSTER__.__DOMAIN__:__CONTROLLER_EXT_SSL_PORT__ export ARVADOS_API_HOST_INSECURE=true set -o pipefail # First, validate that the CA is installed and that we can query it with no errors. -if ! curl -s -o /dev/null https://workbench.${ARVADOS_API_HOST}/users/welcome?return_to=%2F; then +if ! curl -s -o /dev/null https://${ARVADOS_API_HOST}/users/welcome?return_to=%2F; then echo "The Arvados CA was not correctly installed. Although some components will work," echo "others won't. Please verify that the CA cert file was installed correctly and" echo "retry running these tests." @@ -37,10 +37,6 @@ fi echo "Arvados project uuid is '${project_uuid}'" -echo "Uploading arvados/jobs' docker image to the project" -VERSION="2.1.1" -arv-keepdocker --pull arvados/jobs "${VERSION}" --project-uuid "${project_uuid}" - # Create the initial user echo "Creating initial user '__INITIAL_USER__'" user_uuid=$(arv --format=uuid user list --filters '[["email", "=", "__INITIAL_USER_EMAIL__"], ["username", "=", "__INITIAL_USER__"]]') @@ -55,14 +51,18 @@ echo "Activating user '__INITIAL_USER__'" arv user update --uuid "${user_uuid}" --user '{"is_active": true}' echo "Getting the user API TOKEN" -user_api_token=$(arv api_client_authorization list --filters "[[\"owner_uuid\", \"=\", \"${user_uuid}\"],[\"kind\", \"==\", \"arvados#apiClientAuthorization\"]]" --limit=1 |jq -r .items[].api_token) +user_api_token=$(arv api_client_authorization list | jq -r ".items[] | select( .owner_uuid == \"${user_uuid}\" ).api_token" | head -1) if [ "x${user_api_token}" = "x" ]; then + echo "No existing token found for user '__INITIAL_USER__' (user_uuid: '${user_uuid}'). Creating token" user_api_token=$(arv api_client_authorization create --api-client-authorization "{\"owner_uuid\": \"${user_uuid}\"}" | jq -r .api_token) fi +echo "API TOKEN FOR user '__INITIAL_USER__': '${user_api_token}'." + # Change to the user's token and run the workflow +echo "Switching to user '__INITIAL_USER__'" export ARVADOS_API_TOKEN="${user_api_token}" echo "Running test CWL workflow" -cwl-runner hasher-workflow.cwl hasher-workflow-job.yml +cwl-runner --debug hasher-workflow.cwl hasher-workflow-job.yml