qontract-reconcile 0.10.1rc1201__py3-none-any.whl → 0.10.2.dev1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (140) hide show
  1. qontract_reconcile-0.10.2.dev1.dist-info/METADATA +500 -0
  2. {qontract_reconcile-0.10.1rc1201.dist-info → qontract_reconcile-0.10.2.dev1.dist-info}/RECORD +14 -132
  3. {qontract_reconcile-0.10.1rc1201.dist-info → qontract_reconcile-0.10.2.dev1.dist-info}/WHEEL +1 -2
  4. {qontract_reconcile-0.10.1rc1201.dist-info → qontract_reconcile-0.10.2.dev1.dist-info}/entry_points.txt +1 -0
  5. reconcile/aws_account_manager/README.md +5 -0
  6. reconcile/change_owners/README.md +34 -0
  7. reconcile/external_resources/manager.py +12 -1
  8. reconcile/external_resources/model.py +11 -0
  9. reconcile/glitchtip/README.md +150 -0
  10. reconcile/gql_definitions/introspection.json +51176 -0
  11. reconcile/run_integration.py +293 -0
  12. reconcile/utils/binary.py +2 -2
  13. reconcile/utils/mr/README.md +198 -0
  14. reconcile/utils/oc_map.py +2 -2
  15. tools/qontract_cli.py +0 -0
  16. qontract_reconcile-0.10.1rc1201.dist-info/METADATA +0 -64
  17. qontract_reconcile-0.10.1rc1201.dist-info/top_level.txt +0 -3
  18. reconcile/test/__init__.py +0 -0
  19. reconcile/test/conftest.py +0 -157
  20. reconcile/test/fixtures.py +0 -24
  21. reconcile/test/saas_auto_promotions_manager/__init__.py +0 -0
  22. reconcile/test/saas_auto_promotions_manager/conftest.py +0 -170
  23. reconcile/test/saas_auto_promotions_manager/merge_request_manager/__init__.py +0 -0
  24. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/__init__.py +0 -0
  25. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/conftest.py +0 -115
  26. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/data_keys.py +0 -19
  27. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_desired_state.py +0 -66
  28. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_merge_request_manager.py +0 -86
  29. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_mr_parser.py +0 -352
  30. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_reconciler.py +0 -494
  31. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/__init__.py +0 -0
  32. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/conftest.py +0 -25
  33. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_multiple_namespaces.py +0 -37
  34. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_single_namespace.py +0 -81
  35. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_single_target.py +0 -61
  36. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_json_path_selector.py +0 -74
  37. reconcile/test/saas_auto_promotions_manager/test_integration_test.py +0 -52
  38. reconcile/test/saas_auto_promotions_manager/utils/__init__.py +0 -0
  39. reconcile/test/test_acs_notifiers.py +0 -393
  40. reconcile/test/test_acs_policies.py +0 -497
  41. reconcile/test/test_acs_rbac.py +0 -865
  42. reconcile/test/test_aggregated_list.py +0 -237
  43. reconcile/test/test_amtool.py +0 -37
  44. reconcile/test/test_aws_ami_cleanup.py +0 -230
  45. reconcile/test/test_aws_ami_share.py +0 -68
  46. reconcile/test/test_aws_cloudwatch_log_retention.py +0 -434
  47. reconcile/test/test_aws_iam_keys.py +0 -70
  48. reconcile/test/test_aws_iam_password_reset.py +0 -35
  49. reconcile/test/test_aws_support_cases_sos.py +0 -23
  50. reconcile/test/test_checkpoint.py +0 -178
  51. reconcile/test/test_cli.py +0 -41
  52. reconcile/test/test_closedbox_endpoint_monitoring.py +0 -207
  53. reconcile/test/test_dashdotdb_dora.py +0 -245
  54. reconcile/test/test_database_access_manager.py +0 -660
  55. reconcile/test/test_deadmanssnitch.py +0 -290
  56. reconcile/test/test_gabi_authorized_users.py +0 -72
  57. reconcile/test/test_gcr_mirror.py +0 -14
  58. reconcile/test/test_github_org.py +0 -156
  59. reconcile/test/test_github_repo_invites.py +0 -119
  60. reconcile/test/test_gitlab_housekeeping.py +0 -333
  61. reconcile/test/test_gitlab_labeler.py +0 -126
  62. reconcile/test/test_gitlab_members.py +0 -219
  63. reconcile/test/test_gitlab_permissions.py +0 -164
  64. reconcile/test/test_instrumented_wrappers.py +0 -18
  65. reconcile/test/test_integrations_manager.py +0 -1252
  66. reconcile/test/test_jenkins_worker_fleets.py +0 -57
  67. reconcile/test/test_jira_permissions_validator.py +0 -519
  68. reconcile/test/test_jump_host.py +0 -114
  69. reconcile/test/test_ldap_users.py +0 -125
  70. reconcile/test/test_make.py +0 -28
  71. reconcile/test/test_ocm_additional_routers.py +0 -133
  72. reconcile/test/test_ocm_clusters.py +0 -798
  73. reconcile/test/test_ocm_clusters_manifest_updates.py +0 -87
  74. reconcile/test/test_ocm_machine_pools.py +0 -1103
  75. reconcile/test/test_ocm_update_recommended_version.py +0 -145
  76. reconcile/test/test_ocm_upgrade_scheduler_org_updater.py +0 -125
  77. reconcile/test/test_openshift_base.py +0 -1269
  78. reconcile/test/test_openshift_cluster_bots.py +0 -240
  79. reconcile/test/test_openshift_namespace_labels.py +0 -344
  80. reconcile/test/test_openshift_namespaces.py +0 -256
  81. reconcile/test/test_openshift_resource.py +0 -443
  82. reconcile/test/test_openshift_resources_base.py +0 -478
  83. reconcile/test/test_openshift_saas_deploy.py +0 -188
  84. reconcile/test/test_openshift_saas_deploy_change_tester.py +0 -308
  85. reconcile/test/test_openshift_saas_deploy_trigger_cleaner.py +0 -65
  86. reconcile/test/test_openshift_serviceaccount_tokens.py +0 -282
  87. reconcile/test/test_openshift_tekton_resources.py +0 -265
  88. reconcile/test/test_openshift_upgrade_watcher.py +0 -223
  89. reconcile/test/test_prometheus_rules_tester.py +0 -151
  90. reconcile/test/test_quay_membership.py +0 -86
  91. reconcile/test/test_quay_mirror.py +0 -172
  92. reconcile/test/test_quay_mirror_org.py +0 -82
  93. reconcile/test/test_quay_repos.py +0 -59
  94. reconcile/test/test_queries.py +0 -53
  95. reconcile/test/test_repo_owners.py +0 -47
  96. reconcile/test/test_requests_sender.py +0 -139
  97. reconcile/test/test_saasherder.py +0 -1611
  98. reconcile/test/test_saasherder_allowed_secret_paths.py +0 -125
  99. reconcile/test/test_secret_reader.py +0 -153
  100. reconcile/test/test_slack_base.py +0 -183
  101. reconcile/test/test_slack_usergroups.py +0 -785
  102. reconcile/test/test_sql_query.py +0 -316
  103. reconcile/test/test_status_board.py +0 -258
  104. reconcile/test/test_terraform_aws_route53.py +0 -29
  105. reconcile/test/test_terraform_cloudflare_dns.py +0 -117
  106. reconcile/test/test_terraform_cloudflare_resources.py +0 -408
  107. reconcile/test/test_terraform_cloudflare_users.py +0 -747
  108. reconcile/test/test_terraform_repo.py +0 -440
  109. reconcile/test/test_terraform_resources.py +0 -519
  110. reconcile/test/test_terraform_tgw_attachments.py +0 -1295
  111. reconcile/test/test_terraform_users.py +0 -152
  112. reconcile/test/test_terraform_vpc_peerings.py +0 -576
  113. reconcile/test/test_terraform_vpc_peerings_build_desired_state.py +0 -1434
  114. reconcile/test/test_three_way_diff_strategy.py +0 -131
  115. reconcile/test/test_utils_jinja2.py +0 -130
  116. reconcile/test/test_vault_replication.py +0 -534
  117. reconcile/test/test_vault_utils.py +0 -47
  118. reconcile/test/test_version_bump.py +0 -18
  119. reconcile/test/test_vpc_peerings_validator.py +0 -194
  120. reconcile/test/test_wrong_region.py +0 -78
  121. release/__init__.py +0 -0
  122. release/test_version.py +0 -50
  123. release/version.py +0 -104
  124. tools/cli_commands/test/__init__.py +0 -0
  125. tools/cli_commands/test/conftest.py +0 -332
  126. tools/cli_commands/test/test_aws_cost_report.py +0 -258
  127. tools/cli_commands/test/test_cost_management_api.py +0 -326
  128. tools/cli_commands/test/test_gpg_encrypt.py +0 -235
  129. tools/cli_commands/test/test_openshift_cost_optimization_report.py +0 -255
  130. tools/cli_commands/test/test_openshift_cost_report.py +0 -295
  131. tools/cli_commands/test/test_util.py +0 -70
  132. tools/test/__init__.py +0 -0
  133. tools/test/conftest.py +0 -77
  134. tools/test/test_app_interface_metrics_exporter.py +0 -48
  135. tools/test/test_erv2.py +0 -80
  136. tools/test/test_get_container_images.py +0 -230
  137. tools/test/test_qontract_cli.py +0 -197
  138. tools/test/test_saas_promotion_state.py +0 -187
  139. tools/test/test_sd_app_sre_alert_report.py +0 -74
  140. tools/test/test_sre_checkpoints.py +0 -79
@@ -1,660 +0,0 @@
1
- from collections import defaultdict
2
- from collections.abc import Callable
3
- from typing import Any
4
- from unittest.mock import MagicMock
5
-
6
- import pytest
7
- from pytest_mock import MockerFixture
8
-
9
- from reconcile.database_access_manager import (
10
- DatabaseConnectionParameters,
11
- DBAMResource,
12
- JobFailedError,
13
- JobStatus,
14
- JobStatusCondition,
15
- PSQLScriptGenerator,
16
- _create_database_connection_parameter,
17
- _db_access_acccess_is_valid,
18
- _DBDonnections,
19
- _generate_password,
20
- _populate_resources,
21
- _process_db_access,
22
- )
23
- from reconcile.gql_definitions.terraform_resources.database_access_manager import (
24
- DatabaseAccessAccessGranteeV1,
25
- DatabaseAccessAccessV1,
26
- DatabaseAccessV1,
27
- NamespaceV1,
28
- )
29
- from reconcile.utils.openshift_resource import OpenshiftResource
30
-
31
-
32
- @pytest.fixture
33
- def db_access(gql_class_factory: Callable[..., DatabaseAccessV1]) -> DatabaseAccessV1:
34
- return gql_class_factory(
35
- DatabaseAccessV1,
36
- {
37
- "username": "test",
38
- "name": "test",
39
- "database": "test",
40
- },
41
- )
42
-
43
-
44
- @pytest.fixture
45
- def db_access_access(
46
- gql_class_factory: Callable[..., DatabaseAccessAccessV1],
47
- ) -> DatabaseAccessAccessV1:
48
- return gql_class_factory(
49
- DatabaseAccessAccessV1,
50
- {
51
- "grants": ["INSERT", "SELECT"],
52
- "target": {
53
- "dbschema": "foo",
54
- },
55
- },
56
- )
57
-
58
-
59
- @pytest.fixture
60
- def db_access_namespace(gql_class_factory: Callable[..., NamespaceV1]) -> NamespaceV1:
61
- return gql_class_factory(
62
- NamespaceV1,
63
- {
64
- "name": "test-namespace",
65
- "cluster": {
66
- "name": "test-cluster",
67
- },
68
- },
69
- )
70
-
71
-
72
- @pytest.fixture
73
- def db_access_complete(
74
- db_access: DatabaseAccessV1, db_access_access: DatabaseAccessAccessV1
75
- ) -> DatabaseAccessV1:
76
- db_access.access = [db_access_access]
77
- return db_access
78
-
79
-
80
- @pytest.fixture
81
- def db_connection_parameter():
82
- return DatabaseConnectionParameters(
83
- host="localhost",
84
- port="5432",
85
- user="test",
86
- password="postgres", # notsecret
87
- database="user",
88
- )
89
-
90
-
91
- @pytest.fixture
92
- def db_admin_connection_parameter():
93
- return DatabaseConnectionParameters(
94
- host="localhost",
95
- port="5432",
96
- user="admin",
97
- password="adminpw", # notsecret
98
- database="test",
99
- )
100
-
101
-
102
- @pytest.fixture
103
- def db_secret_dict() -> dict[str, dict[str, str]]:
104
- return {
105
- "data": {
106
- "db.password": "aGR1aHNkZnVoc2Rm", # notsecret
107
- "db.host": "bG9jYWxob3N0",
108
- "db.port": "NTQzMg==",
109
- "db.user": "dGVzdA==",
110
- "db.name": "dGVzdA==",
111
- }
112
- }
113
-
114
-
115
- @pytest.fixture
116
- def openshift_resource_secet() -> OpenshiftResource:
117
- return OpenshiftResource(
118
- body={
119
- "metadata": {"name": "test"},
120
- "kind": "secret",
121
- "data": {"password": "postgres"},
122
- },
123
- integration="TEST",
124
- integration_version="0.0.1",
125
- )
126
-
127
-
128
- def _assert_create_script(script: str) -> None:
129
- assert 'CREATE DATABASE "test"' in script
130
- assert "REVOKE ALL ON DATABASE" in script
131
- assert 'CREATE ROLE "test"' in script
132
- assert 'ALTER ROLE "test" WITH LOGIN' in script
133
- assert 'GRANT CONNECT ON DATABASE "test" to "test"' in script
134
- assert "CREATE SCHEMA IF NOT EXISTS" in script
135
- assert 'GRANT "test" to "admin";' in script
136
-
137
-
138
- def _assert_grant_access(script: str) -> None:
139
- assert 'GRANT INSERT,SELECT ON ALL TABLES IN SCHEMA "foo" TO "test"' in script
140
-
141
-
142
- def _assert_delete_script(script: str) -> None:
143
- assert (
144
- '\n\\set ON_ERROR_STOP on\n\\c "test"\nREASSIGN OWNED BY "test" TO "admin";\nDROP ROLE IF EXISTS "test";\\gexec'
145
- in script
146
- )
147
-
148
-
149
- def _assert_revoke_access(script: str) -> None:
150
- assert 'REVOKE ALL PRIVILEGES ON ALL TABLES IN SCHEMA "foo" FROM "test";' in script
151
-
152
-
153
- def test_generate_create_user(
154
- db_access: DatabaseAccessV1,
155
- db_connection_parameter: DatabaseConnectionParameters,
156
- db_admin_connection_parameter: DatabaseConnectionParameters,
157
- ) -> None:
158
- s = PSQLScriptGenerator(
159
- db_access=db_access,
160
- connection_parameter=db_connection_parameter,
161
- admin_connection_parameter=db_admin_connection_parameter,
162
- engine="postgres",
163
- )
164
- script = s._generate_create_user()
165
- _assert_create_script(script)
166
-
167
-
168
- def test_generate_delete_user(
169
- db_access: DatabaseAccessV1,
170
- db_connection_parameter: DatabaseConnectionParameters,
171
- db_admin_connection_parameter: DatabaseConnectionParameters,
172
- ) -> None:
173
- s = PSQLScriptGenerator(
174
- db_access=db_access,
175
- connection_parameter=db_connection_parameter,
176
- admin_connection_parameter=db_admin_connection_parameter,
177
- engine="postgres",
178
- )
179
- script = s._generate_delete_user()
180
- _assert_delete_script(script)
181
-
182
-
183
- def test_generate_access(
184
- db_access: DatabaseAccessV1,
185
- db_access_access: DatabaseAccessAccessV1,
186
- db_connection_parameter: DatabaseConnectionParameters,
187
- db_admin_connection_parameter: DatabaseConnectionParameters,
188
- ):
189
- db_access.access = [db_access_access]
190
-
191
- s = PSQLScriptGenerator(
192
- db_access=db_access,
193
- connection_parameter=db_connection_parameter,
194
- admin_connection_parameter=db_connection_parameter,
195
- engine="postgres",
196
- )
197
- script = s._generate_db_access()
198
- _assert_grant_access(script)
199
-
200
-
201
- def test_generate_revoke_access(
202
- db_access: DatabaseAccessV1,
203
- db_access_access: DatabaseAccessAccessV1,
204
- db_connection_parameter: DatabaseConnectionParameters,
205
- db_admin_connection_parameter: DatabaseConnectionParameters,
206
- ):
207
- db_access.access = [db_access_access]
208
-
209
- s = PSQLScriptGenerator(
210
- db_access=db_access,
211
- connection_parameter=db_connection_parameter,
212
- admin_connection_parameter=db_connection_parameter,
213
- engine="postgres",
214
- )
215
- script = s._generate_revoke_db_access()
216
- _assert_revoke_access(script)
217
-
218
-
219
- @pytest.mark.parametrize(
220
- "current, expected",
221
- [
222
- (None, ""),
223
- (
224
- DatabaseAccessV1(
225
- username="test", name="test", database="test", delete=False, access=[]
226
- ),
227
- "",
228
- ),
229
- (
230
- DatabaseAccessV1(
231
- username="test",
232
- name="test",
233
- database="test",
234
- delete=False,
235
- access=[
236
- DatabaseAccessAccessV1(
237
- grants=["SELECT", "INSERT", "UPDATE"],
238
- target=DatabaseAccessAccessGranteeV1(dbschema="foo"),
239
- )
240
- ],
241
- ),
242
- 'REVOKE UPDATE ON ALL TABLES IN SCHEMA "foo" FROM "test";',
243
- ),
244
- (
245
- DatabaseAccessV1(
246
- username="test",
247
- name="test",
248
- database="test",
249
- delete=False,
250
- access=[
251
- DatabaseAccessAccessV1(
252
- grants=["SELECT"],
253
- target=DatabaseAccessAccessGranteeV1(dbschema="bar"),
254
- )
255
- ],
256
- ),
257
- 'REVOKE ALL PRIVILEGES ON ALL TABLES IN SCHEMA "bar" FROM "test";',
258
- ),
259
- ],
260
- )
261
- def test_generate_revoke_changed(
262
- db_access_complete: DatabaseAccessV1,
263
- db_connection_parameter: DatabaseConnectionParameters,
264
- db_admin_connection_parameter: DatabaseConnectionParameters,
265
- expected: str,
266
- current: DatabaseAccessV1 | None,
267
- ):
268
- s = PSQLScriptGenerator(
269
- db_access=db_access_complete,
270
- current_db_access=current,
271
- connection_parameter=db_connection_parameter,
272
- admin_connection_parameter=db_connection_parameter,
273
- engine="postgres",
274
- )
275
- script = s._generate_revoke_changed()
276
- assert script == expected
277
-
278
-
279
- def test_generate_complete(
280
- db_access_complete: DatabaseAccessV1,
281
- db_connection_parameter: DatabaseConnectionParameters,
282
- db_admin_connection_parameter: DatabaseConnectionParameters,
283
- ):
284
- s = PSQLScriptGenerator(
285
- db_access=db_access_complete,
286
- connection_parameter=db_connection_parameter,
287
- admin_connection_parameter=db_admin_connection_parameter,
288
- engine="postgres",
289
- )
290
- script = s.generate_script()
291
- _assert_create_script(script)
292
- _assert_grant_access(script)
293
-
294
-
295
- def test_generate_delete_complete(
296
- db_access_complete: DatabaseAccessV1,
297
- db_connection_parameter: DatabaseConnectionParameters,
298
- db_admin_connection_parameter: DatabaseConnectionParameters,
299
- ):
300
- db_access_complete.delete = True
301
- s = PSQLScriptGenerator(
302
- db_access=db_access_complete,
303
- connection_parameter=db_connection_parameter,
304
- admin_connection_parameter=db_admin_connection_parameter,
305
- engine="postgres",
306
- )
307
- script = s.generate_script()
308
- _assert_delete_script(script)
309
- _assert_revoke_access(script)
310
-
311
-
312
- def test_db_access_acccess_is_valid(
313
- db_access_complete: DatabaseAccessV1, db_access_access: DatabaseAccessAccessV1
314
- ):
315
- assert db_access_complete.access
316
- assert _db_access_acccess_is_valid(db_access_complete)
317
- db_access_complete.access.append(db_access_access)
318
- assert not _db_access_acccess_is_valid(db_access_complete)
319
-
320
-
321
- def test_job_completion():
322
- s = JobStatus(conditions=[])
323
- assert s.is_complete() is False
324
-
325
- s = JobStatus(conditions=[JobStatusCondition(type="Complete")])
326
- assert s.is_complete()
327
- assert s.has_errors() is False
328
-
329
-
330
- def test_has_errors():
331
- s = JobStatus(conditions=[JobStatusCondition(type="Failed")])
332
- assert s.is_complete()
333
- assert s.has_errors()
334
-
335
-
336
- def test_populate_resources(
337
- mocker: MockerFixture,
338
- db_access: DatabaseAccessV1,
339
- db_connection_parameter: DatabaseConnectionParameters,
340
- db_admin_connection_parameter: DatabaseConnectionParameters,
341
- openshift_resource_secet: OpenshiftResource,
342
- ):
343
- mocker.patch(
344
- "reconcile.database_access_manager.orb.fetch_provider_vault_secret",
345
- return_value=openshift_resource_secet,
346
- )
347
- reources = _populate_resources(
348
- db_access=db_access,
349
- engine="postgres",
350
- image_repository="foo",
351
- pull_secret={
352
- "version": 1,
353
- "annotations": [],
354
- "type": "a",
355
- "labels": [],
356
- "path": "/foo/bar",
357
- },
358
- admin_secret_name="db-secret",
359
- resource_prefix="dbam-foo",
360
- settings={"foo": "bar"},
361
- user_connection=db_connection_parameter,
362
- admin_connection=db_admin_connection_parameter,
363
- )
364
-
365
- r_kinds = [r.resource.kind for r in reources]
366
- assert sorted(r_kinds) == ["Job", "Secret", "Secret", "ServiceAccount", "secret"]
367
-
368
-
369
- def test__create_database_connection_parameter_user_exists(
370
- db_access: DatabaseAccessV1,
371
- db_secret_dict: dict[str, dict[str, str]],
372
- mocker: MockerFixture,
373
- ):
374
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
375
- oc.get.return_value = db_secret_dict
376
- p = _create_database_connection_parameter(
377
- db_access=db_access,
378
- namespace_name="foo",
379
- oc=oc,
380
- admin_secret_name="db-secret",
381
- user_secret_name="db-user-secret",
382
- )
383
- conn = DatabaseConnectionParameters(
384
- host="localhost",
385
- port="5432",
386
- user="test",
387
- password="hduhsdfuhsdf",
388
- database="test",
389
- )
390
-
391
- assert p["user"] == conn
392
- assert p["admin"] == conn
393
- assert oc.get.call_count == 2
394
-
395
-
396
- def test__create_database_connection_parameter_user_missing(
397
- db_access: DatabaseAccessV1,
398
- db_secret_dict: dict[str, dict[str, str]],
399
- mocker: MockerFixture,
400
- ):
401
- pw_generated = "1N5j7oksB45l8w0RJD8qR0ENJP1yOAOs" # notsecret
402
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
403
- oc.get.side_effect = [None, db_secret_dict]
404
- mocker.patch(
405
- "reconcile.database_access_manager._generate_password",
406
- return_value=pw_generated,
407
- )
408
- p = _create_database_connection_parameter(
409
- db_access=db_access,
410
- namespace_name="foo",
411
- oc=oc,
412
- admin_secret_name="db-secret",
413
- user_secret_name="db-user-secret",
414
- )
415
- conn = DatabaseConnectionParameters(
416
- host="localhost",
417
- port="5432",
418
- user="test",
419
- password=pw_generated,
420
- database="test",
421
- )
422
-
423
- admin_conn = conn.copy()
424
- admin_conn.password = "hduhsdfuhsdf"
425
-
426
- assert p["user"] == conn
427
- assert p["admin"] == admin_conn
428
- assert oc.get.call_count == 2
429
-
430
-
431
- def test_generate_password():
432
- assert len(_generate_password()) == 32
433
- assert _generate_password() != _generate_password()
434
-
435
-
436
- @pytest.fixture
437
- def dbam_state(mocker: MockerFixture) -> MockerFixture:
438
- return mocker.patch("reconcile.database_access_manager.State", autospec=True)
439
-
440
-
441
- @pytest.fixture
442
- def vault_mock(mocker: MockerFixture) -> MockerFixture:
443
- return mocker.patch("reconcile.utils.vault._VaultClient", autospec=True)
444
-
445
-
446
- @pytest.fixture
447
- def dbam_process_mocks(
448
- openshift_resource_secet: OpenshiftResource,
449
- mocker: MockerFixture,
450
- db_connection_parameter: DatabaseConnectionParameters,
451
- db_admin_connection_parameter: DatabaseConnectionParameters,
452
- ) -> DBAMResource:
453
- expected_resource = DBAMResource(resource=openshift_resource_secet, clean_up=True)
454
- mocker.patch(
455
- "reconcile.database_access_manager._create_database_connection_parameter",
456
- return_value=_DBDonnections(
457
- user=db_connection_parameter,
458
- admin=db_admin_connection_parameter,
459
- ),
460
- )
461
- mocker.patch(
462
- "reconcile.database_access_manager._populate_resources",
463
- return_value=[expected_resource],
464
- )
465
- return expected_resource
466
-
467
-
468
- @pytest.fixture
469
- def ai_settings() -> dict[str, Any]:
470
- d: dict[str, Any] = defaultdict(str)
471
- d["sqlQuery"] = {
472
- "imageRepository": {"foo": "bar"},
473
- "pullSecret": {"foo": "bar"},
474
- }
475
- return d
476
-
477
-
478
- def test__process_db_access_job_pass(
479
- db_access: DatabaseAccessV1,
480
- db_access_namespace: NamespaceV1,
481
- dbam_state: MagicMock,
482
- dbam_process_mocks: DBAMResource,
483
- mocker: MockerFixture,
484
- ai_settings: dict[str, Any],
485
- vault_mock: MagicMock,
486
- ):
487
- dbam_state.exists.return_value = False
488
- dbam_state.get.return_value = db_access
489
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
490
- oc.get.return_value = {"status": {"conditions": [{"type": "Complete"}]}}
491
-
492
- oc_map = mocker.patch("reconcile.database_access_manager.OC_Map", autospec=True)
493
- oc_map.return_value.__enter__.return_value = oc_map
494
- oc_map.get_cluster.return_value = oc
495
-
496
- ob_delete = mocker.patch(
497
- "reconcile.database_access_manager.openshift_base.delete", autospec=True
498
- )
499
-
500
- _process_db_access(
501
- False,
502
- dbam_state,
503
- db_access,
504
- namespace=db_access_namespace,
505
- admin_secret_name="db-secret",
506
- engine="postgres",
507
- settings=ai_settings,
508
- vault_output_path="foo",
509
- vault_client=vault_mock,
510
- )
511
-
512
- vault_mock.write.assert_called_once_with(
513
- {
514
- "path": "foo/database-access-manager/test-cluster/test-namespace/test",
515
- "data": {
516
- "host": "localhost",
517
- "port": "5432",
518
- "user": "test",
519
- "password": "postgres",
520
- "database": "user",
521
- },
522
- },
523
- decode_base64=False,
524
- )
525
-
526
- assert ob_delete.call_count == 1
527
- ob_delete.assert_called_once_with(
528
- dry_run=False,
529
- oc_map=oc_map,
530
- cluster="test-cluster",
531
- namespace="test-namespace",
532
- resource_type="secret",
533
- name=dbam_process_mocks.resource.name,
534
- enable_deletion=True,
535
- )
536
-
537
-
538
- def test__process_db_access_job_error(
539
- db_access: DatabaseAccessV1,
540
- dbam_state: MagicMock,
541
- db_access_namespace: NamespaceV1,
542
- dbam_process_mocks: DBAMResource,
543
- mocker: MockerFixture,
544
- ai_settings: dict[str, Any],
545
- vault_mock: MagicMock,
546
- ):
547
- dbam_state.exists.return_value = False
548
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
549
- oc.get.return_value = {"status": {"conditions": [{"type": "Failed"}]}}
550
- oc_map = mocker.patch("reconcile.database_access_manager.OC_Map", autospec=True)
551
- oc_map.return_value.__enter__.return_value = oc_map
552
- oc_map.get_cluster.return_value = oc
553
-
554
- with pytest.raises(JobFailedError):
555
- _process_db_access(
556
- False,
557
- dbam_state,
558
- db_access,
559
- namespace=db_access_namespace,
560
- admin_secret_name="db-secret",
561
- engine="postgres",
562
- settings=ai_settings,
563
- vault_output_path="foo",
564
- vault_client=vault_mock,
565
- )
566
-
567
-
568
- def test__process_db_access_state_diff(
569
- db_access: DatabaseAccessV1,
570
- dbam_state: MagicMock,
571
- db_access_namespace: NamespaceV1,
572
- dbam_process_mocks: DBAMResource,
573
- mocker: MockerFixture,
574
- ai_settings: dict[str, Any],
575
- vault_mock: MagicMock,
576
- ):
577
- dba_current = db_access.dict(by_alias=True)
578
- dba_current["access"] = [{"grants": ["SELECT"], "target": {"dbschema": "test"}}]
579
- dbam_state.get.return_value = dba_current
580
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
581
- oc.get.return_value = False
582
- oc_map = mocker.patch("reconcile.database_access_manager.OC_Map", autospec=True)
583
- oc_map.return_value.__enter__.return_value = oc_map
584
- oc_map.get_cluster.return_value = oc
585
-
586
- ob_apply = mocker.patch(
587
- "reconcile.database_access_manager.openshift_base.apply", autospec=True
588
- )
589
- _process_db_access(
590
- False,
591
- dbam_state,
592
- db_access,
593
- namespace=db_access_namespace,
594
- admin_secret_name="db-secret",
595
- engine="postgres",
596
- settings=ai_settings,
597
- vault_output_path="foo",
598
- vault_client=vault_mock,
599
- )
600
-
601
- assert ob_apply.call_count == 1
602
- ob_apply.assert_called_once_with(
603
- dry_run=False,
604
- oc_map=oc_map,
605
- cluster="test-cluster",
606
- namespace="test-namespace",
607
- resource_type="secret",
608
- resource=dbam_process_mocks.resource,
609
- wait_for_namespace=False,
610
- )
611
-
612
-
613
- @pytest.mark.parametrize("field", ["database", "username"])
614
- def test__process_db_access_value_error_database(
615
- db_access: DatabaseAccessV1,
616
- dbam_state: MagicMock,
617
- db_access_namespace: NamespaceV1,
618
- dbam_process_mocks: DBAMResource,
619
- ai_settings: dict[str, Any],
620
- field: str,
621
- vault_mock: MagicMock,
622
- ):
623
- dba_current = db_access.dict(by_alias=True)
624
- dba_current[field] = "foo"
625
- dbam_state.get.return_value = dba_current
626
-
627
- with pytest.raises(ValueError):
628
- _process_db_access(
629
- False,
630
- dbam_state,
631
- db_access,
632
- namespace=db_access_namespace,
633
- admin_secret_name="db-secret",
634
- engine="postgres",
635
- settings=ai_settings,
636
- vault_output_path="foo",
637
- vault_client=vault_mock,
638
- )
639
-
640
-
641
- def test__process_db_access_state_exists_matched(
642
- db_access: DatabaseAccessV1,
643
- db_access_namespace: NamespaceV1,
644
- dbam_state: MagicMock,
645
- vault_mock: MagicMock,
646
- ):
647
- dbam_state.exists.return_value = True
648
- dbam_state.get.return_value = db_access.dict(by_alias=True)
649
- # missing mocks would cause this to fail if not exit early
650
- _process_db_access(
651
- False,
652
- dbam_state,
653
- db_access,
654
- namespace=db_access_namespace,
655
- admin_secret_name="db-secret",
656
- engine="postgres",
657
- settings=defaultdict(str),
658
- vault_output_path="foo",
659
- vault_client=vault_mock,
660
- )