qontract-reconcile 0.10.1rc1201__py3-none-any.whl → 0.10.2.dev1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (140) hide show
  1. qontract_reconcile-0.10.2.dev1.dist-info/METADATA +500 -0
  2. {qontract_reconcile-0.10.1rc1201.dist-info → qontract_reconcile-0.10.2.dev1.dist-info}/RECORD +14 -132
  3. {qontract_reconcile-0.10.1rc1201.dist-info → qontract_reconcile-0.10.2.dev1.dist-info}/WHEEL +1 -2
  4. {qontract_reconcile-0.10.1rc1201.dist-info → qontract_reconcile-0.10.2.dev1.dist-info}/entry_points.txt +1 -0
  5. reconcile/aws_account_manager/README.md +5 -0
  6. reconcile/change_owners/README.md +34 -0
  7. reconcile/external_resources/manager.py +12 -1
  8. reconcile/external_resources/model.py +11 -0
  9. reconcile/glitchtip/README.md +150 -0
  10. reconcile/gql_definitions/introspection.json +51176 -0
  11. reconcile/run_integration.py +293 -0
  12. reconcile/utils/binary.py +2 -2
  13. reconcile/utils/mr/README.md +198 -0
  14. reconcile/utils/oc_map.py +2 -2
  15. tools/qontract_cli.py +0 -0
  16. qontract_reconcile-0.10.1rc1201.dist-info/METADATA +0 -64
  17. qontract_reconcile-0.10.1rc1201.dist-info/top_level.txt +0 -3
  18. reconcile/test/__init__.py +0 -0
  19. reconcile/test/conftest.py +0 -157
  20. reconcile/test/fixtures.py +0 -24
  21. reconcile/test/saas_auto_promotions_manager/__init__.py +0 -0
  22. reconcile/test/saas_auto_promotions_manager/conftest.py +0 -170
  23. reconcile/test/saas_auto_promotions_manager/merge_request_manager/__init__.py +0 -0
  24. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/__init__.py +0 -0
  25. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/conftest.py +0 -115
  26. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/data_keys.py +0 -19
  27. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_desired_state.py +0 -66
  28. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_merge_request_manager.py +0 -86
  29. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_mr_parser.py +0 -352
  30. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_reconciler.py +0 -494
  31. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/__init__.py +0 -0
  32. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/conftest.py +0 -25
  33. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_multiple_namespaces.py +0 -37
  34. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_single_namespace.py +0 -81
  35. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_single_target.py +0 -61
  36. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_json_path_selector.py +0 -74
  37. reconcile/test/saas_auto_promotions_manager/test_integration_test.py +0 -52
  38. reconcile/test/saas_auto_promotions_manager/utils/__init__.py +0 -0
  39. reconcile/test/test_acs_notifiers.py +0 -393
  40. reconcile/test/test_acs_policies.py +0 -497
  41. reconcile/test/test_acs_rbac.py +0 -865
  42. reconcile/test/test_aggregated_list.py +0 -237
  43. reconcile/test/test_amtool.py +0 -37
  44. reconcile/test/test_aws_ami_cleanup.py +0 -230
  45. reconcile/test/test_aws_ami_share.py +0 -68
  46. reconcile/test/test_aws_cloudwatch_log_retention.py +0 -434
  47. reconcile/test/test_aws_iam_keys.py +0 -70
  48. reconcile/test/test_aws_iam_password_reset.py +0 -35
  49. reconcile/test/test_aws_support_cases_sos.py +0 -23
  50. reconcile/test/test_checkpoint.py +0 -178
  51. reconcile/test/test_cli.py +0 -41
  52. reconcile/test/test_closedbox_endpoint_monitoring.py +0 -207
  53. reconcile/test/test_dashdotdb_dora.py +0 -245
  54. reconcile/test/test_database_access_manager.py +0 -660
  55. reconcile/test/test_deadmanssnitch.py +0 -290
  56. reconcile/test/test_gabi_authorized_users.py +0 -72
  57. reconcile/test/test_gcr_mirror.py +0 -14
  58. reconcile/test/test_github_org.py +0 -156
  59. reconcile/test/test_github_repo_invites.py +0 -119
  60. reconcile/test/test_gitlab_housekeeping.py +0 -333
  61. reconcile/test/test_gitlab_labeler.py +0 -126
  62. reconcile/test/test_gitlab_members.py +0 -219
  63. reconcile/test/test_gitlab_permissions.py +0 -164
  64. reconcile/test/test_instrumented_wrappers.py +0 -18
  65. reconcile/test/test_integrations_manager.py +0 -1252
  66. reconcile/test/test_jenkins_worker_fleets.py +0 -57
  67. reconcile/test/test_jira_permissions_validator.py +0 -519
  68. reconcile/test/test_jump_host.py +0 -114
  69. reconcile/test/test_ldap_users.py +0 -125
  70. reconcile/test/test_make.py +0 -28
  71. reconcile/test/test_ocm_additional_routers.py +0 -133
  72. reconcile/test/test_ocm_clusters.py +0 -798
  73. reconcile/test/test_ocm_clusters_manifest_updates.py +0 -87
  74. reconcile/test/test_ocm_machine_pools.py +0 -1103
  75. reconcile/test/test_ocm_update_recommended_version.py +0 -145
  76. reconcile/test/test_ocm_upgrade_scheduler_org_updater.py +0 -125
  77. reconcile/test/test_openshift_base.py +0 -1269
  78. reconcile/test/test_openshift_cluster_bots.py +0 -240
  79. reconcile/test/test_openshift_namespace_labels.py +0 -344
  80. reconcile/test/test_openshift_namespaces.py +0 -256
  81. reconcile/test/test_openshift_resource.py +0 -443
  82. reconcile/test/test_openshift_resources_base.py +0 -478
  83. reconcile/test/test_openshift_saas_deploy.py +0 -188
  84. reconcile/test/test_openshift_saas_deploy_change_tester.py +0 -308
  85. reconcile/test/test_openshift_saas_deploy_trigger_cleaner.py +0 -65
  86. reconcile/test/test_openshift_serviceaccount_tokens.py +0 -282
  87. reconcile/test/test_openshift_tekton_resources.py +0 -265
  88. reconcile/test/test_openshift_upgrade_watcher.py +0 -223
  89. reconcile/test/test_prometheus_rules_tester.py +0 -151
  90. reconcile/test/test_quay_membership.py +0 -86
  91. reconcile/test/test_quay_mirror.py +0 -172
  92. reconcile/test/test_quay_mirror_org.py +0 -82
  93. reconcile/test/test_quay_repos.py +0 -59
  94. reconcile/test/test_queries.py +0 -53
  95. reconcile/test/test_repo_owners.py +0 -47
  96. reconcile/test/test_requests_sender.py +0 -139
  97. reconcile/test/test_saasherder.py +0 -1611
  98. reconcile/test/test_saasherder_allowed_secret_paths.py +0 -125
  99. reconcile/test/test_secret_reader.py +0 -153
  100. reconcile/test/test_slack_base.py +0 -183
  101. reconcile/test/test_slack_usergroups.py +0 -785
  102. reconcile/test/test_sql_query.py +0 -316
  103. reconcile/test/test_status_board.py +0 -258
  104. reconcile/test/test_terraform_aws_route53.py +0 -29
  105. reconcile/test/test_terraform_cloudflare_dns.py +0 -117
  106. reconcile/test/test_terraform_cloudflare_resources.py +0 -408
  107. reconcile/test/test_terraform_cloudflare_users.py +0 -747
  108. reconcile/test/test_terraform_repo.py +0 -440
  109. reconcile/test/test_terraform_resources.py +0 -519
  110. reconcile/test/test_terraform_tgw_attachments.py +0 -1295
  111. reconcile/test/test_terraform_users.py +0 -152
  112. reconcile/test/test_terraform_vpc_peerings.py +0 -576
  113. reconcile/test/test_terraform_vpc_peerings_build_desired_state.py +0 -1434
  114. reconcile/test/test_three_way_diff_strategy.py +0 -131
  115. reconcile/test/test_utils_jinja2.py +0 -130
  116. reconcile/test/test_vault_replication.py +0 -534
  117. reconcile/test/test_vault_utils.py +0 -47
  118. reconcile/test/test_version_bump.py +0 -18
  119. reconcile/test/test_vpc_peerings_validator.py +0 -194
  120. reconcile/test/test_wrong_region.py +0 -78
  121. release/__init__.py +0 -0
  122. release/test_version.py +0 -50
  123. release/version.py +0 -104
  124. tools/cli_commands/test/__init__.py +0 -0
  125. tools/cli_commands/test/conftest.py +0 -332
  126. tools/cli_commands/test/test_aws_cost_report.py +0 -258
  127. tools/cli_commands/test/test_cost_management_api.py +0 -326
  128. tools/cli_commands/test/test_gpg_encrypt.py +0 -235
  129. tools/cli_commands/test/test_openshift_cost_optimization_report.py +0 -255
  130. tools/cli_commands/test/test_openshift_cost_report.py +0 -295
  131. tools/cli_commands/test/test_util.py +0 -70
  132. tools/test/__init__.py +0 -0
  133. tools/test/conftest.py +0 -77
  134. tools/test/test_app_interface_metrics_exporter.py +0 -48
  135. tools/test/test_erv2.py +0 -80
  136. tools/test/test_get_container_images.py +0 -230
  137. tools/test/test_qontract_cli.py +0 -197
  138. tools/test/test_saas_promotion_state.py +0 -187
  139. tools/test/test_sd_app_sre_alert_report.py +0 -74
  140. tools/test/test_sre_checkpoints.py +0 -79
@@ -1,865 +0,0 @@
1
- import copy
2
- from unittest.mock import Mock
3
-
4
- import pytest
5
- from pytest_mock import MockerFixture
6
-
7
- from reconcile.acs_rbac import (
8
- AcsAccessScope,
9
- AcsRbacIntegration,
10
- AcsRole,
11
- AssignmentPair,
12
- )
13
- from reconcile.gql_definitions.acs.acs_rbac import (
14
- AcsRbacQueryData,
15
- ClusterV1,
16
- NamespaceV1,
17
- NamespaceV1_ClusterV1,
18
- OidcPermissionAcsV1,
19
- RoleV1,
20
- UserV1,
21
- )
22
- from reconcile.utils.acs import rbac
23
-
24
- AUTH_PROVIDER_ID = "6a41743c-792b-11ee-b962-0242ac120002"
25
-
26
-
27
- @pytest.fixture
28
- def query_data_desired_state() -> AcsRbacQueryData:
29
- return AcsRbacQueryData(
30
- acs_rbacs=[
31
- UserV1(
32
- org_username="foo",
33
- roles=[
34
- RoleV1(
35
- name="app-sre-admin",
36
- oidc_permissions=[
37
- OidcPermissionAcsV1(
38
- name="app-sre-acs-admin",
39
- description="admin access to acs instance",
40
- service="acs",
41
- permission_set="admin",
42
- clusters=[],
43
- namespaces=[],
44
- )
45
- ],
46
- )
47
- ],
48
- ),
49
- UserV1(
50
- org_username="bar",
51
- roles=[
52
- RoleV1(
53
- name="app-sre-admin",
54
- oidc_permissions=[
55
- OidcPermissionAcsV1(
56
- name="app-sre-acs-admin",
57
- description="admin access to acs instance",
58
- service="acs",
59
- permission_set="admin",
60
- clusters=[],
61
- namespaces=[],
62
- )
63
- ],
64
- )
65
- ],
66
- ),
67
- UserV1(
68
- org_username="foofoo",
69
- roles=[
70
- RoleV1(
71
- name="tenant-role-a",
72
- oidc_permissions=[
73
- OidcPermissionAcsV1(
74
- name="cluster-analyst",
75
- description="analyst access to clusters in acs instance",
76
- service="acs",
77
- permission_set="analyst",
78
- clusters=[
79
- ClusterV1(name="clusterA"),
80
- ClusterV1(name="clusterB"),
81
- ],
82
- namespaces=[],
83
- )
84
- ],
85
- )
86
- ],
87
- ),
88
- UserV1(
89
- org_username="barbar",
90
- roles=[
91
- RoleV1(
92
- name="tenant-role-a",
93
- oidc_permissions=[
94
- OidcPermissionAcsV1(
95
- name="cluster-analyst",
96
- description="analyst access to clusters in acs instance",
97
- service="acs",
98
- permission_set="analyst",
99
- clusters=[
100
- ClusterV1(name="clusterA"),
101
- ClusterV1(name="clusterB"),
102
- ],
103
- namespaces=[],
104
- )
105
- ],
106
- )
107
- ],
108
- ),
109
- UserV1(
110
- org_username="foobar",
111
- roles=[
112
- RoleV1(
113
- name="tenant-role-b",
114
- oidc_permissions=[
115
- OidcPermissionAcsV1(
116
- name="service-vuln-admin",
117
- description="vuln-admin access to service namespaces in acs instance",
118
- service="acs",
119
- permission_set="vuln-admin",
120
- clusters=[],
121
- namespaces=[
122
- NamespaceV1(
123
- name="serviceA-stage",
124
- cluster=NamespaceV1_ClusterV1(
125
- name="stage-cluster"
126
- ),
127
- ),
128
- NamespaceV1(
129
- name="serviceA-prod",
130
- cluster=NamespaceV1_ClusterV1(
131
- name="prod-cluster"
132
- ),
133
- ),
134
- ],
135
- )
136
- ],
137
- )
138
- ],
139
- ),
140
- ]
141
- )
142
-
143
-
144
- @pytest.fixture
145
- def modeled_acs_roles() -> list[AcsRole]:
146
- return [
147
- AcsRole(
148
- name="app-sre-acs-admin",
149
- description="admin access to acs instance",
150
- assignments=[
151
- AssignmentPair(key="userid", value="foo"),
152
- AssignmentPair(key="userid", value="bar"),
153
- ],
154
- permission_set_name="Admin",
155
- access_scope=AcsAccessScope(
156
- name="Unrestricted",
157
- description="Access to all clusters and namespaces",
158
- clusters=[],
159
- namespaces=[],
160
- ),
161
- system_default=False,
162
- ),
163
- AcsRole(
164
- name="cluster-analyst",
165
- description="analyst access to clusters in acs instance",
166
- assignments=[
167
- AssignmentPair(key="userid", value="foofoo"),
168
- AssignmentPair(key="userid", value="barbar"),
169
- ],
170
- permission_set_name="Analyst",
171
- access_scope=AcsAccessScope(
172
- name="cluster-analyst",
173
- description="analyst access to clusters in acs instance",
174
- clusters=["clusterA", "clusterB"],
175
- namespaces=[],
176
- ),
177
- system_default=False,
178
- ),
179
- AcsRole(
180
- name="service-vuln-admin",
181
- description="vuln-admin access to service namespaces in acs instance",
182
- assignments=[AssignmentPair(key="userid", value="foobar")],
183
- permission_set_name="Vulnerability Management Admin",
184
- access_scope=AcsAccessScope(
185
- name="service-vuln-admin",
186
- description="vuln-admin access to service namespaces in acs instance",
187
- clusters=[],
188
- namespaces=[
189
- {"clusterName": "stage-cluster", "namespaceName": "serviceA-stage"},
190
- {"clusterName": "prod-cluster", "namespaceName": "serviceA-prod"},
191
- ],
192
- ),
193
- system_default=False,
194
- ),
195
- ]
196
-
197
-
198
- @pytest.fixture
199
- def api_response_roles() -> list[rbac.Role]:
200
- return [
201
- rbac.Role(
202
- api_data={
203
- "name": "app-sre-acs-admin",
204
- "permissionSetId": "1",
205
- "accessScopeId": "1",
206
- "description": "admin access to acs instance",
207
- "system_default": False,
208
- }
209
- ),
210
- rbac.Role(
211
- api_data={
212
- "name": "cluster-analyst",
213
- "permissionSetId": "2",
214
- "accessScopeId": "2",
215
- "description": "analyst access to clusters in acs instance",
216
- "system_default": False,
217
- }
218
- ),
219
- rbac.Role(
220
- api_data={
221
- "name": "service-vuln-admin",
222
- "permissionSetId": "3",
223
- "accessScopeId": "3",
224
- "description": "vuln-admin access to service namespaces in acs instance",
225
- "system_default": False,
226
- }
227
- ),
228
- ]
229
-
230
-
231
- @pytest.fixture
232
- def api_response_groups() -> list[rbac.Group]:
233
- return [
234
- rbac.Group(
235
- api_data={
236
- "roleName": "app-sre-acs-admin",
237
- "props": {
238
- "id": "1",
239
- "authProviderId": AUTH_PROVIDER_ID,
240
- "key": "userid",
241
- "value": "foo",
242
- },
243
- }
244
- ),
245
- rbac.Group(
246
- api_data={
247
- "roleName": "app-sre-acs-admin",
248
- "props": {
249
- "id": "2",
250
- "authProviderId": AUTH_PROVIDER_ID,
251
- "key": "userid",
252
- "value": "bar",
253
- },
254
- }
255
- ),
256
- rbac.Group(
257
- api_data={
258
- "roleName": "cluster-analyst",
259
- "props": {
260
- "id": "3",
261
- "authProviderId": AUTH_PROVIDER_ID,
262
- "key": "userid",
263
- "value": "foofoo",
264
- },
265
- }
266
- ),
267
- rbac.Group(
268
- api_data={
269
- "roleName": "cluster-analyst",
270
- "props": {
271
- "id": "4",
272
- "authProviderId": AUTH_PROVIDER_ID,
273
- "key": "userid",
274
- "value": "barbar",
275
- },
276
- }
277
- ),
278
- rbac.Group(
279
- api_data={
280
- "roleName": "service-vuln-admin",
281
- "props": {
282
- "id": "5",
283
- "authProviderId": AUTH_PROVIDER_ID,
284
- "key": "userid",
285
- "value": "foobar",
286
- },
287
- }
288
- ),
289
- ]
290
-
291
-
292
- @pytest.fixture
293
- def api_response_access_scopes() -> list[rbac.AccessScope]:
294
- return [
295
- rbac.AccessScope(
296
- api_data={
297
- "id": "1",
298
- "name": "Unrestricted",
299
- "description": "Access to all clusters and namespaces",
300
- "rules": None,
301
- }
302
- ),
303
- rbac.AccessScope(
304
- api_data={
305
- "id": "2",
306
- "name": "cluster-analyst",
307
- "description": "analyst access to clusters in acs instance",
308
- "rules": {
309
- "includedClusters": ["clusterA", "clusterB"],
310
- "includedNamespaces": [],
311
- },
312
- }
313
- ),
314
- rbac.AccessScope(
315
- api_data={
316
- "id": "3",
317
- "name": "service-vuln-admin",
318
- "description": "vuln-admin access to service namespaces in acs instance",
319
- "rules": {
320
- "includedClusters": [],
321
- "includedNamespaces": [
322
- {
323
- "clusterName": "stage-cluster",
324
- "namespaceName": "serviceA-stage",
325
- },
326
- {
327
- "clusterName": "prod-cluster",
328
- "namespaceName": "serviceA-prod",
329
- },
330
- ],
331
- },
332
- }
333
- ),
334
- ]
335
-
336
-
337
- @pytest.fixture
338
- def api_response_permission_sets() -> list[rbac.PermissionSet]:
339
- return [
340
- rbac.PermissionSet(
341
- api_data={
342
- "id": "1",
343
- "name": "Admin",
344
- }
345
- ),
346
- rbac.PermissionSet(
347
- api_data={
348
- "id": "2",
349
- "name": "Analyst",
350
- }
351
- ),
352
- rbac.PermissionSet(
353
- api_data={
354
- "id": "3",
355
- "name": "Vulnerability Management Admin",
356
- }
357
- ),
358
- ]
359
-
360
-
361
- def test_get_desired_state(
362
- mocker: MockerFixture,
363
- query_data_desired_state: AcsRbacQueryData,
364
- modeled_acs_roles: list[AcsRole],
365
- ):
366
- query_func = mocker.patch("reconcile.acs_rbac.acs_rbac_query", autospec=True)
367
- query_func.return_value = query_data_desired_state
368
-
369
- integration = AcsRbacIntegration()
370
- result = integration.get_desired_state(query_func)
371
-
372
- assert result == modeled_acs_roles
373
-
374
-
375
- def test_get_current_state(
376
- modeled_acs_roles: list[AcsRole],
377
- api_response_roles: list[rbac.Role],
378
- api_response_groups: list[rbac.Group],
379
- api_response_access_scopes: list[rbac.AccessScope],
380
- api_response_permission_sets: list[rbac.PermissionSet],
381
- ):
382
- integration = AcsRbacIntegration()
383
- result = integration.get_current_state(
384
- AUTH_PROVIDER_ID,
385
- rbac.RbacResources(
386
- roles=api_response_roles,
387
- access_scopes=api_response_access_scopes,
388
- groups=api_response_groups,
389
- permission_sets=api_response_permission_sets,
390
- ),
391
- )
392
-
393
- assert result == modeled_acs_roles
394
-
395
-
396
- def test_add_rbac_dry_run(
397
- mocker: MockerFixture,
398
- modeled_acs_roles: list[AcsRole],
399
- api_response_access_scopes: list[rbac.AccessScope],
400
- api_response_permission_sets: list[rbac.PermissionSet],
401
- ):
402
- dry_run = True
403
- desired = modeled_acs_roles
404
-
405
- current = modeled_acs_roles[:-1]
406
- current_access_scopes = api_response_access_scopes[:-1]
407
-
408
- acs_mock = Mock()
409
-
410
- rbac_api_resources = rbac.RbacResources(
411
- roles=[],
412
- access_scopes=current_access_scopes,
413
- groups=[],
414
- permission_sets=api_response_permission_sets,
415
- )
416
- mocker.patch.object(
417
- acs_mock, "create_access_scope", side_effect=[api_response_access_scopes[2].id]
418
- )
419
- mocker.patch.object(acs_mock, "create_role")
420
- mocker.patch.object(acs_mock, "create_group_batch")
421
-
422
- integration = AcsRbacIntegration()
423
- integration.reconcile(
424
- desired=desired,
425
- current=current,
426
- rbac_api_resources=rbac_api_resources,
427
- acs=acs_mock,
428
- auth_provider_id=AUTH_PROVIDER_ID,
429
- dry_run=dry_run,
430
- )
431
-
432
- acs_mock.create_access_scope.assert_not_called()
433
- acs_mock.create_role.assert_not_called()
434
- acs_mock.create_group_batch.assert_not_called()
435
-
436
-
437
- def test_add_rbac(
438
- mocker: MockerFixture,
439
- modeled_acs_roles: list[AcsRole],
440
- api_response_access_scopes: list[rbac.AccessScope],
441
- api_response_permission_sets: list[rbac.PermissionSet],
442
- ):
443
- dry_run = False
444
- desired = modeled_acs_roles
445
-
446
- current = modeled_acs_roles[:-1]
447
- current_access_scopes = api_response_access_scopes[:-1]
448
-
449
- acs_mock = Mock()
450
-
451
- rbac_api_resources = rbac.RbacResources(
452
- roles=[],
453
- access_scopes=current_access_scopes,
454
- groups=[],
455
- permission_sets=api_response_permission_sets,
456
- )
457
- mocker.patch.object(
458
- acs_mock, "create_access_scope", side_effect=[api_response_access_scopes[2].id]
459
- )
460
- mocker.patch.object(acs_mock, "create_role")
461
- mocker.patch.object(acs_mock, "create_group_batch")
462
-
463
- integration = AcsRbacIntegration()
464
- integration.reconcile(
465
- desired=desired,
466
- current=current,
467
- rbac_api_resources=rbac_api_resources,
468
- acs=acs_mock,
469
- auth_provider_id=AUTH_PROVIDER_ID,
470
- dry_run=dry_run,
471
- )
472
-
473
- acs_mock.create_access_scope.assert_has_calls([
474
- mocker.call(
475
- desired[2].access_scope.name,
476
- desired[2].access_scope.description,
477
- desired[2].access_scope.clusters,
478
- desired[2].access_scope.namespaces,
479
- ),
480
- ])
481
- acs_mock.create_role.assert_has_calls([
482
- mocker.call(
483
- desired[2].name,
484
- desired[2].description,
485
- api_response_permission_sets[2].id,
486
- api_response_access_scopes[2].id,
487
- ),
488
- ])
489
- acs_mock.create_group_batch.assert_has_calls([
490
- mocker.call([
491
- rbac.AcsRbacApi.GroupAdd(
492
- role_name=desired[2].name,
493
- key=a.key,
494
- value=a.value,
495
- auth_provider_id=AUTH_PROVIDER_ID,
496
- )
497
- for a in desired[2].assignments
498
- ])
499
- ])
500
-
501
-
502
- def test_delete_rbac_dry_run(
503
- mocker: MockerFixture,
504
- modeled_acs_roles: list[AcsRole],
505
- api_response_access_scopes: list[rbac.AccessScope],
506
- api_response_groups: list[rbac.Group],
507
- ):
508
- dry_run = True
509
- current = modeled_acs_roles
510
- desired = modeled_acs_roles[:-1] # remove 'cluster-analyst' role
511
-
512
- acs_mock = Mock()
513
-
514
- rbac_api_resources = rbac.RbacResources(
515
- roles=[],
516
- access_scopes=api_response_access_scopes,
517
- groups=api_response_groups,
518
- permission_sets=[],
519
- )
520
- mocker.patch.object(acs_mock, "delete_role")
521
- mocker.patch.object(acs_mock, "delete_group_batch")
522
- mocker.patch.object(acs_mock, "delete_access_scope")
523
-
524
- integration = AcsRbacIntegration()
525
- integration.reconcile(
526
- desired=desired,
527
- current=current,
528
- rbac_api_resources=rbac_api_resources,
529
- acs=acs_mock,
530
- auth_provider_id=AUTH_PROVIDER_ID,
531
- dry_run=dry_run,
532
- )
533
-
534
- acs_mock.delete_role.assert_not_called()
535
- acs_mock.delete_group_batch.assert_not_called()
536
- acs_mock.delete_access_scope.assert_not_called()
537
-
538
-
539
- def test_delete_rbac(
540
- mocker: MockerFixture,
541
- modeled_acs_roles: list[AcsRole],
542
- api_response_access_scopes: list[rbac.AccessScope],
543
- api_response_groups: list[rbac.Group],
544
- ):
545
- dry_run = False
546
- current = modeled_acs_roles
547
- desired = (
548
- modeled_acs_roles[:1] + modeled_acs_roles[2:]
549
- ) # remove 'cluster-analyst' role
550
-
551
- acs_mock = Mock()
552
-
553
- rbac_api_resources = rbac.RbacResources(
554
- roles=[],
555
- access_scopes=api_response_access_scopes,
556
- groups=api_response_groups,
557
- permission_sets=[],
558
- )
559
- mocker.patch.object(acs_mock, "delete_role")
560
- mocker.patch.object(acs_mock, "delete_group_batch")
561
- mocker.patch.object(acs_mock, "delete_access_scope")
562
-
563
- integration = AcsRbacIntegration()
564
- integration.reconcile(
565
- desired=desired,
566
- current=current,
567
- rbac_api_resources=rbac_api_resources,
568
- acs=acs_mock,
569
- auth_provider_id=AUTH_PROVIDER_ID,
570
- dry_run=dry_run,
571
- )
572
-
573
- acs_mock.delete_role.assert_has_calls([mocker.call(current[1].name)])
574
- acs_mock.delete_group_batch.assert_has_calls([
575
- mocker.call([api_response_groups[2], api_response_groups[3]])
576
- ])
577
- acs_mock.delete_access_scope.assert_has_calls([
578
- mocker.call(api_response_access_scopes[1].id)
579
- ])
580
-
581
-
582
- def test_update_rbac_groups_only(
583
- mocker: MockerFixture,
584
- modeled_acs_roles: list[AcsRole],
585
- api_response_access_scopes: list[rbac.AccessScope],
586
- api_response_permission_sets: list[rbac.PermissionSet],
587
- api_response_groups: list[rbac.Group],
588
- ):
589
- dry_run = False
590
- desired = modeled_acs_roles
591
-
592
- current = copy.deepcopy(modeled_acs_roles)
593
- # change a user assignment in 'app-sre-acs-admin' role
594
- current[0].assignments[0].value = "lasagna"
595
- current_groups = copy.deepcopy(api_response_groups)
596
- current_groups[0].value = "lasagna"
597
-
598
- acs_mock = Mock()
599
-
600
- rbac_api_resources = rbac.RbacResources(
601
- roles=[],
602
- access_scopes=api_response_access_scopes,
603
- groups=current_groups,
604
- permission_sets=api_response_permission_sets,
605
- )
606
- mocker.patch.object(acs_mock, "update_group_batch")
607
- mocker.patch.object(acs_mock, "update_access_scope")
608
- mocker.patch.object(acs_mock, "update_role")
609
-
610
- integration = AcsRbacIntegration()
611
- integration.reconcile(
612
- desired=desired,
613
- current=current,
614
- rbac_api_resources=rbac_api_resources,
615
- acs=acs_mock,
616
- auth_provider_id=AUTH_PROVIDER_ID,
617
- dry_run=dry_run,
618
- )
619
-
620
- acs_mock.update_group_batch.assert_has_calls([
621
- mocker.call(
622
- [current_groups[0]],
623
- [
624
- rbac.AcsRbacApi.GroupAdd(
625
- role_name=desired[0].name,
626
- key=desired[0].assignments[0].key,
627
- value=desired[0].assignments[0].value,
628
- auth_provider_id=AUTH_PROVIDER_ID,
629
- )
630
- ],
631
- )
632
- ])
633
-
634
- acs_mock.update_access_scope.assert_not_called()
635
- acs_mock.update_role.assert_not_called()
636
-
637
-
638
- def test_full_reconcile(
639
- mocker: MockerFixture,
640
- modeled_acs_roles: list[AcsRole],
641
- api_response_access_scopes: list[rbac.AccessScope],
642
- api_response_permission_sets: list[rbac.PermissionSet],
643
- api_response_groups: list[rbac.Group],
644
- ):
645
- dry_run = False
646
-
647
- # trigger creation of new role and deletion of existing 'service-vuln-admin' role
648
- desired = modeled_acs_roles[:-1] + [
649
- AcsRole(
650
- name="new-role",
651
- description="add me",
652
- assignments=[
653
- AssignmentPair(key="userid", value="elsa"),
654
- AssignmentPair(key="userid", value="anna"),
655
- ],
656
- permission_set_name="Admin",
657
- access_scope=AcsAccessScope(
658
- name="Unrestricted",
659
- description="Access to all clusters and namespaces",
660
- clusters=[],
661
- namespaces=[],
662
- ),
663
- system_default=False,
664
- )
665
- ]
666
-
667
- current = copy.deepcopy(modeled_acs_roles)
668
- # change permission set to trigger update to existing 'cluster-analyst' role
669
- current[1].permission_set_name = "Vulnerability Management Admin"
670
- # remove a cluster from scope to trigger update to access scope of 'cluster-analyst'
671
- current[1].access_scope.clusters.pop()
672
- current_access_scopes = copy.deepcopy(api_response_access_scopes)
673
- current_access_scopes[1].clusters.pop()
674
-
675
- acs_mock = Mock()
676
-
677
- rbac_api_resources = rbac.RbacResources(
678
- roles=[],
679
- access_scopes=current_access_scopes,
680
- groups=api_response_groups,
681
- permission_sets=api_response_permission_sets,
682
- )
683
- mocker.patch.object(acs_mock, "create_access_scope")
684
- mocker.patch.object(acs_mock, "create_role")
685
- mocker.patch.object(acs_mock, "create_group_batch")
686
- mocker.patch.object(acs_mock, "delete_role")
687
- mocker.patch.object(acs_mock, "delete_group_batch")
688
- mocker.patch.object(acs_mock, "delete_access_scope")
689
- mocker.patch.object(acs_mock, "update_group_batch")
690
- mocker.patch.object(acs_mock, "update_access_scope")
691
- mocker.patch.object(acs_mock, "update_role")
692
-
693
- integration = AcsRbacIntegration()
694
- integration.reconcile(
695
- desired=desired,
696
- current=current,
697
- rbac_api_resources=rbac_api_resources,
698
- acs=acs_mock,
699
- auth_provider_id=AUTH_PROVIDER_ID,
700
- dry_run=dry_run,
701
- )
702
-
703
- acs_mock.create_role.assert_has_calls([
704
- mocker.call(
705
- desired[2].name,
706
- desired[2].description,
707
- api_response_permission_sets[0].id,
708
- api_response_access_scopes[0].id,
709
- ),
710
- ])
711
- acs_mock.create_group_batch.assert_has_calls([
712
- mocker.call([
713
- rbac.AcsRbacApi.GroupAdd(
714
- role_name=desired[2].name,
715
- key=a.key,
716
- value=a.value,
717
- auth_provider_id=AUTH_PROVIDER_ID,
718
- )
719
- for a in desired[2].assignments
720
- ])
721
- ])
722
-
723
- acs_mock.delete_role.assert_has_calls([mocker.call(current[2].name)])
724
- acs_mock.delete_group_batch.assert_has_calls([
725
- mocker.call([api_response_groups[4]])
726
- ])
727
- acs_mock.delete_access_scope.assert_has_calls([
728
- mocker.call(api_response_access_scopes[2].id)
729
- ])
730
-
731
- acs_mock.update_role.assert_has_calls([
732
- mocker.call(
733
- desired[1].name,
734
- desired[1].description,
735
- # use originals
736
- api_response_permission_sets[1].id,
737
- api_response_access_scopes[1].id,
738
- )
739
- ])
740
- acs_mock.update_access_scope.assert_has_calls([
741
- mocker.call(
742
- api_response_access_scopes[1].id,
743
- desired[1].access_scope.name,
744
- desired[1].access_scope.description,
745
- desired[1].access_scope.clusters,
746
- desired[1].access_scope.namespaces,
747
- )
748
- ])
749
-
750
- # new desired role is admin scope. Should use existing 'Unrestricted' system default
751
- acs_mock.create_access_scope.assert_not_called()
752
- acs_mock.update_group_batch.assert_not_called()
753
-
754
-
755
- def test_full_reconcile_with_errors(
756
- mocker: MockerFixture,
757
- modeled_acs_roles: list[AcsRole],
758
- api_response_access_scopes: list[rbac.AccessScope],
759
- api_response_permission_sets: list[rbac.PermissionSet],
760
- api_response_groups: list[rbac.Group],
761
- ):
762
- dry_run = False
763
-
764
- desired = modeled_acs_roles[:-1] + [
765
- AcsRole(
766
- name="new-role",
767
- description="add me",
768
- assignments=[
769
- AssignmentPair(key="userid", value="elsa"),
770
- AssignmentPair(key="userid", value="anna"),
771
- ],
772
- permission_set_name="Admin",
773
- access_scope=AcsAccessScope(
774
- name="Unrestricted",
775
- description="Access to all clusters and namespaces",
776
- clusters=[],
777
- namespaces=[],
778
- ),
779
- system_default=False,
780
- )
781
- ]
782
-
783
- current = copy.deepcopy(modeled_acs_roles)
784
- # change permission set to trigger update to existing 'cluster-analyst' role
785
- current[1].permission_set_name = "Vulnerability Management Admin"
786
- # remove a cluster from scope to trigger update to access scope of 'cluster-analyst'
787
- current[1].access_scope.clusters.pop()
788
- current_access_scopes = copy.deepcopy(api_response_access_scopes)
789
- current_access_scopes[1].clusters.pop()
790
-
791
- acs_mock = Mock()
792
-
793
- rbac_api_resources = rbac.RbacResources(
794
- roles=[],
795
- access_scopes=current_access_scopes,
796
- groups=api_response_groups,
797
- permission_sets=api_response_permission_sets,
798
- )
799
- mocker.patch.object(acs_mock, "create_access_scope")
800
- mocker.patch.object(
801
- acs_mock, "create_role", side_effect=Exception("Simulated error")
802
- )
803
- mocker.patch.object(acs_mock, "create_group_batch")
804
- mocker.patch.object(
805
- acs_mock, "delete_group_batch", side_effect=Exception("Simulated error")
806
- )
807
- mocker.patch.object(acs_mock, "delete_role")
808
- mocker.patch.object(acs_mock, "delete_access_scope")
809
- mocker.patch.object(acs_mock, "update_group_batch")
810
- mocker.patch.object(acs_mock, "update_access_scope")
811
- mocker.patch.object(acs_mock, "update_role")
812
-
813
- integration = AcsRbacIntegration()
814
- with pytest.raises(ExceptionGroup) as exc_info:
815
- integration.reconcile(
816
- desired=desired,
817
- current=current,
818
- rbac_api_resources=rbac_api_resources,
819
- acs=acs_mock,
820
- auth_provider_id=AUTH_PROVIDER_ID,
821
- dry_run=dry_run,
822
- )
823
-
824
- # call to 'create_role' failed. remaining create logic should be skipped
825
- acs_mock.create_role.assert_has_calls([
826
- mocker.call(
827
- desired[2].name,
828
- desired[2].description,
829
- api_response_permission_sets[0].id,
830
- api_response_access_scopes[0].id,
831
- ),
832
- ])
833
- acs_mock.create_group_batch.assert_not_called()
834
-
835
- acs_mock.delete_group_batch.assert_has_calls([
836
- mocker.call([api_response_groups[4]])
837
- ])
838
- # call to 'delete_group_batch' failed. remaining delete logic should be skipped
839
- acs_mock.delete_role.assert_not_called()
840
- acs_mock.delete_access_scope.assert_not_called()
841
-
842
- acs_mock.update_role.assert_has_calls([
843
- mocker.call(
844
- desired[1].name,
845
- desired[1].description,
846
- # use originals
847
- api_response_permission_sets[1].id,
848
- api_response_access_scopes[1].id,
849
- )
850
- ])
851
- acs_mock.update_access_scope.assert_has_calls([
852
- mocker.call(
853
- api_response_access_scopes[1].id,
854
- desired[1].access_scope.name,
855
- desired[1].access_scope.description,
856
- desired[1].access_scope.clusters,
857
- desired[1].access_scope.namespaces,
858
- )
859
- ])
860
-
861
- # new desired role is admin scope. Should use existing 'Unrestricted' system default
862
- acs_mock.create_access_scope.assert_not_called()
863
- acs_mock.update_group_batch.assert_not_called()
864
-
865
- assert "Reconcile errors occurred" in str(exc_info.value)