X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/678bb65be05eb32aae75de93c33b4ac2a606b7c4..b8f531b9df0401545003d3e7f4b566bfc96346aa:/sdk/python/tests/fed-migrate/create_users.py diff --git a/sdk/python/tests/fed-migrate/create_users.py b/sdk/python/tests/fed-migrate/create_users.py index 08dec5cde3..cea624ec4c 100644 --- a/sdk/python/tests/fed-migrate/create_users.py +++ b/sdk/python/tests/fed-migrate/create_users.py @@ -13,11 +13,11 @@ def maketoken(newtok): # case 1 # user only exists on cluster A -apiA.users().create(body={"user": {"email": "case1@test"}}).execute() +apiA.users().create(body={"user": {"email": "case1@test", "is_active": True}}).execute() # case 2 # user exists on cluster A and has remotes on B and C -case2 = apiA.users().create(body={"user": {"email": "case2@test"}}).execute() +case2 = apiA.users().create(body={"user": {"email": "case2@test", "is_active": True}}).execute() newtok = apiA.api_client_authorizations().create(body={ "api_client_authorization": {'owner_uuid': case2["uuid"]}}).execute() arvados.api(host=j["arvados_api_hosts"][1], token=maketoken(newtok), insecure=True).users().current().execute() @@ -25,11 +25,11 @@ arvados.api(host=j["arvados_api_hosts"][2], token=maketoken(newtok), insecure=Tr # case 3 # user only exists on cluster B -case3 = apiB.users().create(body={"user": {"email": "case3@test"}}).execute() +case3 = apiB.users().create(body={"user": {"email": "case3@test", "is_active": True}}).execute() # case 4 # user only exists on cluster B and has remotes on A and C -case4 = apiB.users().create(body={"user": {"email": "case4@test"}}).execute() +case4 = apiB.users().create(body={"user": {"email": "case4@test", "is_active": True}}).execute() newtok = apiB.api_client_authorizations().create(body={ "api_client_authorization": {'owner_uuid': case4["uuid"]}}).execute() arvados.api(host=j["arvados_api_hosts"][0], token=maketoken(newtok), insecure=True).users().current().execute() @@ -38,18 +38,18 @@ arvados.api(host=j["arvados_api_hosts"][2], token=maketoken(newtok), insecure=Tr # case 5 # user exists on both cluster A and B -case5 = apiA.users().create(body={"user": {"email": "case5@test"}}).execute() -case5 = apiB.users().create(body={"user": {"email": "case5@test"}}).execute() +case5 = apiA.users().create(body={"user": {"email": "case5@test", "is_active": True}}).execute() +case5 = apiB.users().create(body={"user": {"email": "case5@test", "is_active": True}}).execute() # case 6 # user exists on both cluster A and B, with remotes on A, B and C -case6_A = apiA.users().create(body={"user": {"email": "case6@test"}}).execute() +case6_A = apiA.users().create(body={"user": {"email": "case6@test", "is_active": True}}).execute() newtokA = apiA.api_client_authorizations().create(body={ "api_client_authorization": {'owner_uuid': case6_A["uuid"]}}).execute() arvados.api(host=j["arvados_api_hosts"][1], token=maketoken(newtokA), insecure=True).users().current().execute() arvados.api(host=j["arvados_api_hosts"][2], token=maketoken(newtokA), insecure=True).users().current().execute() -case6_B = apiB.users().create(body={"user": {"email": "case6@test"}}).execute() +case6_B = apiB.users().create(body={"user": {"email": "case6@test", "is_active": True}}).execute() newtokB = apiB.api_client_authorizations().create(body={ "api_client_authorization": {'owner_uuid': case6_B["uuid"]}}).execute() arvados.api(host=j["arvados_api_hosts"][0], token=maketoken(newtokB), insecure=True).users().current().execute() @@ -57,13 +57,13 @@ arvados.api(host=j["arvados_api_hosts"][2], token=maketoken(newtokB), insecure=T # case 7 # user exists on both cluster B and A, with remotes on A, B and C -case7_B = apiB.users().create(body={"user": {"email": "case7@test"}}).execute() +case7_B = apiB.users().create(body={"user": {"email": "case7@test", "is_active": True}}).execute() newtokB = apiB.api_client_authorizations().create(body={ "api_client_authorization": {'owner_uuid': case7_B["uuid"]}}).execute() arvados.api(host=j["arvados_api_hosts"][0], token=maketoken(newtokB), insecure=True).users().current().execute() arvados.api(host=j["arvados_api_hosts"][2], token=maketoken(newtokB), insecure=True).users().current().execute() -case7_A = apiA.users().create(body={"user": {"email": "case7@test"}}).execute() +case7_A = apiA.users().create(body={"user": {"email": "case7@test", "is_active": True}}).execute() newtokA = apiA.api_client_authorizations().create(body={ "api_client_authorization": {'owner_uuid': case7_A["uuid"]}}).execute() arvados.api(host=j["arvados_api_hosts"][1], token=maketoken(newtokA), insecure=True).users().current().execute() @@ -71,14 +71,18 @@ arvados.api(host=j["arvados_api_hosts"][2], token=maketoken(newtokA), insecure=T # case 8 # user exists on both cluster B and C, with remotes on A, B and C -case8_B = apiB.users().create(body={"user": {"email": "case8@test"}}).execute() +case8_B = apiB.users().create(body={"user": {"email": "case8@test", "is_active": True}}).execute() newtokB = apiB.api_client_authorizations().create(body={ "api_client_authorization": {'owner_uuid': case8_B["uuid"]}}).execute() arvados.api(host=j["arvados_api_hosts"][0], token=maketoken(newtokB), insecure=True).users().current().execute() arvados.api(host=j["arvados_api_hosts"][2], token=maketoken(newtokB), insecure=True).users().current().execute() -case8_C = apiC.users().create(body={"user": {"email": "case8@test"}}).execute() +case8_C = apiC.users().create(body={"user": {"email": "case8@test", "is_active": True}}).execute() newtokC = apiC.api_client_authorizations().create(body={ "api_client_authorization": {'owner_uuid': case8_C["uuid"]}}).execute() arvados.api(host=j["arvados_api_hosts"][0], token=maketoken(newtokC), insecure=True).users().current().execute() arvados.api(host=j["arvados_api_hosts"][1], token=maketoken(newtokC), insecure=True).users().current().execute() + +# case 9 +# user only exists on cluster B, but is inactive +case9 = apiB.users().create(body={"user": {"email": "case9@test", "is_active": False}}).execute()