qontract-reconcile 0.10.1rc1202__py3-none-any.whl → 0.10.2.dev1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (138) hide show
  1. qontract_reconcile-0.10.2.dev1.dist-info/METADATA +500 -0
  2. {qontract_reconcile-0.10.1rc1202.dist-info → qontract_reconcile-0.10.2.dev1.dist-info}/RECORD +12 -130
  3. {qontract_reconcile-0.10.1rc1202.dist-info → qontract_reconcile-0.10.2.dev1.dist-info}/WHEEL +1 -2
  4. {qontract_reconcile-0.10.1rc1202.dist-info → qontract_reconcile-0.10.2.dev1.dist-info}/entry_points.txt +1 -0
  5. reconcile/aws_account_manager/README.md +5 -0
  6. reconcile/change_owners/README.md +34 -0
  7. reconcile/glitchtip/README.md +150 -0
  8. reconcile/gql_definitions/introspection.json +51176 -0
  9. reconcile/run_integration.py +293 -0
  10. reconcile/utils/binary.py +2 -2
  11. reconcile/utils/mr/README.md +198 -0
  12. reconcile/utils/oc_map.py +2 -2
  13. tools/qontract_cli.py +0 -0
  14. qontract_reconcile-0.10.1rc1202.dist-info/METADATA +0 -64
  15. qontract_reconcile-0.10.1rc1202.dist-info/top_level.txt +0 -3
  16. reconcile/test/__init__.py +0 -0
  17. reconcile/test/conftest.py +0 -157
  18. reconcile/test/fixtures.py +0 -24
  19. reconcile/test/saas_auto_promotions_manager/__init__.py +0 -0
  20. reconcile/test/saas_auto_promotions_manager/conftest.py +0 -170
  21. reconcile/test/saas_auto_promotions_manager/merge_request_manager/__init__.py +0 -0
  22. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/__init__.py +0 -0
  23. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/conftest.py +0 -115
  24. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/data_keys.py +0 -19
  25. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_desired_state.py +0 -66
  26. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_merge_request_manager.py +0 -86
  27. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_mr_parser.py +0 -352
  28. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_reconciler.py +0 -494
  29. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/__init__.py +0 -0
  30. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/conftest.py +0 -25
  31. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_multiple_namespaces.py +0 -37
  32. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_single_namespace.py +0 -81
  33. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_single_target.py +0 -61
  34. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_json_path_selector.py +0 -74
  35. reconcile/test/saas_auto_promotions_manager/test_integration_test.py +0 -52
  36. reconcile/test/saas_auto_promotions_manager/utils/__init__.py +0 -0
  37. reconcile/test/test_acs_notifiers.py +0 -393
  38. reconcile/test/test_acs_policies.py +0 -497
  39. reconcile/test/test_acs_rbac.py +0 -865
  40. reconcile/test/test_aggregated_list.py +0 -237
  41. reconcile/test/test_amtool.py +0 -37
  42. reconcile/test/test_aws_ami_cleanup.py +0 -230
  43. reconcile/test/test_aws_ami_share.py +0 -68
  44. reconcile/test/test_aws_cloudwatch_log_retention.py +0 -434
  45. reconcile/test/test_aws_iam_keys.py +0 -70
  46. reconcile/test/test_aws_iam_password_reset.py +0 -35
  47. reconcile/test/test_aws_support_cases_sos.py +0 -23
  48. reconcile/test/test_checkpoint.py +0 -178
  49. reconcile/test/test_cli.py +0 -41
  50. reconcile/test/test_closedbox_endpoint_monitoring.py +0 -207
  51. reconcile/test/test_dashdotdb_dora.py +0 -245
  52. reconcile/test/test_database_access_manager.py +0 -660
  53. reconcile/test/test_deadmanssnitch.py +0 -290
  54. reconcile/test/test_gabi_authorized_users.py +0 -72
  55. reconcile/test/test_gcr_mirror.py +0 -14
  56. reconcile/test/test_github_org.py +0 -156
  57. reconcile/test/test_github_repo_invites.py +0 -119
  58. reconcile/test/test_gitlab_housekeeping.py +0 -333
  59. reconcile/test/test_gitlab_labeler.py +0 -126
  60. reconcile/test/test_gitlab_members.py +0 -219
  61. reconcile/test/test_gitlab_permissions.py +0 -164
  62. reconcile/test/test_instrumented_wrappers.py +0 -18
  63. reconcile/test/test_integrations_manager.py +0 -1252
  64. reconcile/test/test_jenkins_worker_fleets.py +0 -57
  65. reconcile/test/test_jira_permissions_validator.py +0 -519
  66. reconcile/test/test_jump_host.py +0 -114
  67. reconcile/test/test_ldap_users.py +0 -125
  68. reconcile/test/test_make.py +0 -28
  69. reconcile/test/test_ocm_additional_routers.py +0 -133
  70. reconcile/test/test_ocm_clusters.py +0 -798
  71. reconcile/test/test_ocm_clusters_manifest_updates.py +0 -87
  72. reconcile/test/test_ocm_machine_pools.py +0 -1103
  73. reconcile/test/test_ocm_update_recommended_version.py +0 -145
  74. reconcile/test/test_ocm_upgrade_scheduler_org_updater.py +0 -125
  75. reconcile/test/test_openshift_base.py +0 -1269
  76. reconcile/test/test_openshift_cluster_bots.py +0 -240
  77. reconcile/test/test_openshift_namespace_labels.py +0 -344
  78. reconcile/test/test_openshift_namespaces.py +0 -256
  79. reconcile/test/test_openshift_resource.py +0 -443
  80. reconcile/test/test_openshift_resources_base.py +0 -478
  81. reconcile/test/test_openshift_saas_deploy.py +0 -188
  82. reconcile/test/test_openshift_saas_deploy_change_tester.py +0 -308
  83. reconcile/test/test_openshift_saas_deploy_trigger_cleaner.py +0 -65
  84. reconcile/test/test_openshift_serviceaccount_tokens.py +0 -282
  85. reconcile/test/test_openshift_tekton_resources.py +0 -265
  86. reconcile/test/test_openshift_upgrade_watcher.py +0 -223
  87. reconcile/test/test_prometheus_rules_tester.py +0 -151
  88. reconcile/test/test_quay_membership.py +0 -86
  89. reconcile/test/test_quay_mirror.py +0 -172
  90. reconcile/test/test_quay_mirror_org.py +0 -82
  91. reconcile/test/test_quay_repos.py +0 -59
  92. reconcile/test/test_queries.py +0 -53
  93. reconcile/test/test_repo_owners.py +0 -47
  94. reconcile/test/test_requests_sender.py +0 -139
  95. reconcile/test/test_saasherder.py +0 -1611
  96. reconcile/test/test_saasherder_allowed_secret_paths.py +0 -125
  97. reconcile/test/test_secret_reader.py +0 -153
  98. reconcile/test/test_slack_base.py +0 -183
  99. reconcile/test/test_slack_usergroups.py +0 -785
  100. reconcile/test/test_sql_query.py +0 -316
  101. reconcile/test/test_status_board.py +0 -258
  102. reconcile/test/test_terraform_aws_route53.py +0 -29
  103. reconcile/test/test_terraform_cloudflare_dns.py +0 -117
  104. reconcile/test/test_terraform_cloudflare_resources.py +0 -408
  105. reconcile/test/test_terraform_cloudflare_users.py +0 -747
  106. reconcile/test/test_terraform_repo.py +0 -440
  107. reconcile/test/test_terraform_resources.py +0 -519
  108. reconcile/test/test_terraform_tgw_attachments.py +0 -1295
  109. reconcile/test/test_terraform_users.py +0 -152
  110. reconcile/test/test_terraform_vpc_peerings.py +0 -576
  111. reconcile/test/test_terraform_vpc_peerings_build_desired_state.py +0 -1434
  112. reconcile/test/test_three_way_diff_strategy.py +0 -131
  113. reconcile/test/test_utils_jinja2.py +0 -130
  114. reconcile/test/test_vault_replication.py +0 -534
  115. reconcile/test/test_vault_utils.py +0 -47
  116. reconcile/test/test_version_bump.py +0 -18
  117. reconcile/test/test_vpc_peerings_validator.py +0 -194
  118. reconcile/test/test_wrong_region.py +0 -78
  119. release/__init__.py +0 -0
  120. release/test_version.py +0 -50
  121. release/version.py +0 -104
  122. tools/cli_commands/test/__init__.py +0 -0
  123. tools/cli_commands/test/conftest.py +0 -332
  124. tools/cli_commands/test/test_aws_cost_report.py +0 -258
  125. tools/cli_commands/test/test_cost_management_api.py +0 -326
  126. tools/cli_commands/test/test_gpg_encrypt.py +0 -235
  127. tools/cli_commands/test/test_openshift_cost_optimization_report.py +0 -255
  128. tools/cli_commands/test/test_openshift_cost_report.py +0 -295
  129. tools/cli_commands/test/test_util.py +0 -70
  130. tools/test/__init__.py +0 -0
  131. tools/test/conftest.py +0 -77
  132. tools/test/test_app_interface_metrics_exporter.py +0 -48
  133. tools/test/test_erv2.py +0 -80
  134. tools/test/test_get_container_images.py +0 -230
  135. tools/test/test_qontract_cli.py +0 -197
  136. tools/test/test_saas_promotion_state.py +0 -187
  137. tools/test/test_sd_app_sre_alert_report.py +0 -74
  138. tools/test/test_sre_checkpoints.py +0 -79
@@ -1,660 +0,0 @@
1
- from collections import defaultdict
2
- from collections.abc import Callable
3
- from typing import Any
4
- from unittest.mock import MagicMock
5
-
6
- import pytest
7
- from pytest_mock import MockerFixture
8
-
9
- from reconcile.database_access_manager import (
10
- DatabaseConnectionParameters,
11
- DBAMResource,
12
- JobFailedError,
13
- JobStatus,
14
- JobStatusCondition,
15
- PSQLScriptGenerator,
16
- _create_database_connection_parameter,
17
- _db_access_acccess_is_valid,
18
- _DBDonnections,
19
- _generate_password,
20
- _populate_resources,
21
- _process_db_access,
22
- )
23
- from reconcile.gql_definitions.terraform_resources.database_access_manager import (
24
- DatabaseAccessAccessGranteeV1,
25
- DatabaseAccessAccessV1,
26
- DatabaseAccessV1,
27
- NamespaceV1,
28
- )
29
- from reconcile.utils.openshift_resource import OpenshiftResource
30
-
31
-
32
- @pytest.fixture
33
- def db_access(gql_class_factory: Callable[..., DatabaseAccessV1]) -> DatabaseAccessV1:
34
- return gql_class_factory(
35
- DatabaseAccessV1,
36
- {
37
- "username": "test",
38
- "name": "test",
39
- "database": "test",
40
- },
41
- )
42
-
43
-
44
- @pytest.fixture
45
- def db_access_access(
46
- gql_class_factory: Callable[..., DatabaseAccessAccessV1],
47
- ) -> DatabaseAccessAccessV1:
48
- return gql_class_factory(
49
- DatabaseAccessAccessV1,
50
- {
51
- "grants": ["INSERT", "SELECT"],
52
- "target": {
53
- "dbschema": "foo",
54
- },
55
- },
56
- )
57
-
58
-
59
- @pytest.fixture
60
- def db_access_namespace(gql_class_factory: Callable[..., NamespaceV1]) -> NamespaceV1:
61
- return gql_class_factory(
62
- NamespaceV1,
63
- {
64
- "name": "test-namespace",
65
- "cluster": {
66
- "name": "test-cluster",
67
- },
68
- },
69
- )
70
-
71
-
72
- @pytest.fixture
73
- def db_access_complete(
74
- db_access: DatabaseAccessV1, db_access_access: DatabaseAccessAccessV1
75
- ) -> DatabaseAccessV1:
76
- db_access.access = [db_access_access]
77
- return db_access
78
-
79
-
80
- @pytest.fixture
81
- def db_connection_parameter():
82
- return DatabaseConnectionParameters(
83
- host="localhost",
84
- port="5432",
85
- user="test",
86
- password="postgres", # notsecret
87
- database="user",
88
- )
89
-
90
-
91
- @pytest.fixture
92
- def db_admin_connection_parameter():
93
- return DatabaseConnectionParameters(
94
- host="localhost",
95
- port="5432",
96
- user="admin",
97
- password="adminpw", # notsecret
98
- database="test",
99
- )
100
-
101
-
102
- @pytest.fixture
103
- def db_secret_dict() -> dict[str, dict[str, str]]:
104
- return {
105
- "data": {
106
- "db.password": "aGR1aHNkZnVoc2Rm", # notsecret
107
- "db.host": "bG9jYWxob3N0",
108
- "db.port": "NTQzMg==",
109
- "db.user": "dGVzdA==",
110
- "db.name": "dGVzdA==",
111
- }
112
- }
113
-
114
-
115
- @pytest.fixture
116
- def openshift_resource_secet() -> OpenshiftResource:
117
- return OpenshiftResource(
118
- body={
119
- "metadata": {"name": "test"},
120
- "kind": "secret",
121
- "data": {"password": "postgres"},
122
- },
123
- integration="TEST",
124
- integration_version="0.0.1",
125
- )
126
-
127
-
128
- def _assert_create_script(script: str) -> None:
129
- assert 'CREATE DATABASE "test"' in script
130
- assert "REVOKE ALL ON DATABASE" in script
131
- assert 'CREATE ROLE "test"' in script
132
- assert 'ALTER ROLE "test" WITH LOGIN' in script
133
- assert 'GRANT CONNECT ON DATABASE "test" to "test"' in script
134
- assert "CREATE SCHEMA IF NOT EXISTS" in script
135
- assert 'GRANT "test" to "admin";' in script
136
-
137
-
138
- def _assert_grant_access(script: str) -> None:
139
- assert 'GRANT INSERT,SELECT ON ALL TABLES IN SCHEMA "foo" TO "test"' in script
140
-
141
-
142
- def _assert_delete_script(script: str) -> None:
143
- assert (
144
- '\n\\set ON_ERROR_STOP on\n\\c "test"\nREASSIGN OWNED BY "test" TO "admin";\nDROP ROLE IF EXISTS "test";\\gexec'
145
- in script
146
- )
147
-
148
-
149
- def _assert_revoke_access(script: str) -> None:
150
- assert 'REVOKE ALL PRIVILEGES ON ALL TABLES IN SCHEMA "foo" FROM "test";' in script
151
-
152
-
153
- def test_generate_create_user(
154
- db_access: DatabaseAccessV1,
155
- db_connection_parameter: DatabaseConnectionParameters,
156
- db_admin_connection_parameter: DatabaseConnectionParameters,
157
- ) -> None:
158
- s = PSQLScriptGenerator(
159
- db_access=db_access,
160
- connection_parameter=db_connection_parameter,
161
- admin_connection_parameter=db_admin_connection_parameter,
162
- engine="postgres",
163
- )
164
- script = s._generate_create_user()
165
- _assert_create_script(script)
166
-
167
-
168
- def test_generate_delete_user(
169
- db_access: DatabaseAccessV1,
170
- db_connection_parameter: DatabaseConnectionParameters,
171
- db_admin_connection_parameter: DatabaseConnectionParameters,
172
- ) -> None:
173
- s = PSQLScriptGenerator(
174
- db_access=db_access,
175
- connection_parameter=db_connection_parameter,
176
- admin_connection_parameter=db_admin_connection_parameter,
177
- engine="postgres",
178
- )
179
- script = s._generate_delete_user()
180
- _assert_delete_script(script)
181
-
182
-
183
- def test_generate_access(
184
- db_access: DatabaseAccessV1,
185
- db_access_access: DatabaseAccessAccessV1,
186
- db_connection_parameter: DatabaseConnectionParameters,
187
- db_admin_connection_parameter: DatabaseConnectionParameters,
188
- ):
189
- db_access.access = [db_access_access]
190
-
191
- s = PSQLScriptGenerator(
192
- db_access=db_access,
193
- connection_parameter=db_connection_parameter,
194
- admin_connection_parameter=db_connection_parameter,
195
- engine="postgres",
196
- )
197
- script = s._generate_db_access()
198
- _assert_grant_access(script)
199
-
200
-
201
- def test_generate_revoke_access(
202
- db_access: DatabaseAccessV1,
203
- db_access_access: DatabaseAccessAccessV1,
204
- db_connection_parameter: DatabaseConnectionParameters,
205
- db_admin_connection_parameter: DatabaseConnectionParameters,
206
- ):
207
- db_access.access = [db_access_access]
208
-
209
- s = PSQLScriptGenerator(
210
- db_access=db_access,
211
- connection_parameter=db_connection_parameter,
212
- admin_connection_parameter=db_connection_parameter,
213
- engine="postgres",
214
- )
215
- script = s._generate_revoke_db_access()
216
- _assert_revoke_access(script)
217
-
218
-
219
- @pytest.mark.parametrize(
220
- "current, expected",
221
- [
222
- (None, ""),
223
- (
224
- DatabaseAccessV1(
225
- username="test", name="test", database="test", delete=False, access=[]
226
- ),
227
- "",
228
- ),
229
- (
230
- DatabaseAccessV1(
231
- username="test",
232
- name="test",
233
- database="test",
234
- delete=False,
235
- access=[
236
- DatabaseAccessAccessV1(
237
- grants=["SELECT", "INSERT", "UPDATE"],
238
- target=DatabaseAccessAccessGranteeV1(dbschema="foo"),
239
- )
240
- ],
241
- ),
242
- 'REVOKE UPDATE ON ALL TABLES IN SCHEMA "foo" FROM "test";',
243
- ),
244
- (
245
- DatabaseAccessV1(
246
- username="test",
247
- name="test",
248
- database="test",
249
- delete=False,
250
- access=[
251
- DatabaseAccessAccessV1(
252
- grants=["SELECT"],
253
- target=DatabaseAccessAccessGranteeV1(dbschema="bar"),
254
- )
255
- ],
256
- ),
257
- 'REVOKE ALL PRIVILEGES ON ALL TABLES IN SCHEMA "bar" FROM "test";',
258
- ),
259
- ],
260
- )
261
- def test_generate_revoke_changed(
262
- db_access_complete: DatabaseAccessV1,
263
- db_connection_parameter: DatabaseConnectionParameters,
264
- db_admin_connection_parameter: DatabaseConnectionParameters,
265
- expected: str,
266
- current: DatabaseAccessV1 | None,
267
- ):
268
- s = PSQLScriptGenerator(
269
- db_access=db_access_complete,
270
- current_db_access=current,
271
- connection_parameter=db_connection_parameter,
272
- admin_connection_parameter=db_connection_parameter,
273
- engine="postgres",
274
- )
275
- script = s._generate_revoke_changed()
276
- assert script == expected
277
-
278
-
279
- def test_generate_complete(
280
- db_access_complete: DatabaseAccessV1,
281
- db_connection_parameter: DatabaseConnectionParameters,
282
- db_admin_connection_parameter: DatabaseConnectionParameters,
283
- ):
284
- s = PSQLScriptGenerator(
285
- db_access=db_access_complete,
286
- connection_parameter=db_connection_parameter,
287
- admin_connection_parameter=db_admin_connection_parameter,
288
- engine="postgres",
289
- )
290
- script = s.generate_script()
291
- _assert_create_script(script)
292
- _assert_grant_access(script)
293
-
294
-
295
- def test_generate_delete_complete(
296
- db_access_complete: DatabaseAccessV1,
297
- db_connection_parameter: DatabaseConnectionParameters,
298
- db_admin_connection_parameter: DatabaseConnectionParameters,
299
- ):
300
- db_access_complete.delete = True
301
- s = PSQLScriptGenerator(
302
- db_access=db_access_complete,
303
- connection_parameter=db_connection_parameter,
304
- admin_connection_parameter=db_admin_connection_parameter,
305
- engine="postgres",
306
- )
307
- script = s.generate_script()
308
- _assert_delete_script(script)
309
- _assert_revoke_access(script)
310
-
311
-
312
- def test_db_access_acccess_is_valid(
313
- db_access_complete: DatabaseAccessV1, db_access_access: DatabaseAccessAccessV1
314
- ):
315
- assert db_access_complete.access
316
- assert _db_access_acccess_is_valid(db_access_complete)
317
- db_access_complete.access.append(db_access_access)
318
- assert not _db_access_acccess_is_valid(db_access_complete)
319
-
320
-
321
- def test_job_completion():
322
- s = JobStatus(conditions=[])
323
- assert s.is_complete() is False
324
-
325
- s = JobStatus(conditions=[JobStatusCondition(type="Complete")])
326
- assert s.is_complete()
327
- assert s.has_errors() is False
328
-
329
-
330
- def test_has_errors():
331
- s = JobStatus(conditions=[JobStatusCondition(type="Failed")])
332
- assert s.is_complete()
333
- assert s.has_errors()
334
-
335
-
336
- def test_populate_resources(
337
- mocker: MockerFixture,
338
- db_access: DatabaseAccessV1,
339
- db_connection_parameter: DatabaseConnectionParameters,
340
- db_admin_connection_parameter: DatabaseConnectionParameters,
341
- openshift_resource_secet: OpenshiftResource,
342
- ):
343
- mocker.patch(
344
- "reconcile.database_access_manager.orb.fetch_provider_vault_secret",
345
- return_value=openshift_resource_secet,
346
- )
347
- reources = _populate_resources(
348
- db_access=db_access,
349
- engine="postgres",
350
- image_repository="foo",
351
- pull_secret={
352
- "version": 1,
353
- "annotations": [],
354
- "type": "a",
355
- "labels": [],
356
- "path": "/foo/bar",
357
- },
358
- admin_secret_name="db-secret",
359
- resource_prefix="dbam-foo",
360
- settings={"foo": "bar"},
361
- user_connection=db_connection_parameter,
362
- admin_connection=db_admin_connection_parameter,
363
- )
364
-
365
- r_kinds = [r.resource.kind for r in reources]
366
- assert sorted(r_kinds) == ["Job", "Secret", "Secret", "ServiceAccount", "secret"]
367
-
368
-
369
- def test__create_database_connection_parameter_user_exists(
370
- db_access: DatabaseAccessV1,
371
- db_secret_dict: dict[str, dict[str, str]],
372
- mocker: MockerFixture,
373
- ):
374
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
375
- oc.get.return_value = db_secret_dict
376
- p = _create_database_connection_parameter(
377
- db_access=db_access,
378
- namespace_name="foo",
379
- oc=oc,
380
- admin_secret_name="db-secret",
381
- user_secret_name="db-user-secret",
382
- )
383
- conn = DatabaseConnectionParameters(
384
- host="localhost",
385
- port="5432",
386
- user="test",
387
- password="hduhsdfuhsdf",
388
- database="test",
389
- )
390
-
391
- assert p["user"] == conn
392
- assert p["admin"] == conn
393
- assert oc.get.call_count == 2
394
-
395
-
396
- def test__create_database_connection_parameter_user_missing(
397
- db_access: DatabaseAccessV1,
398
- db_secret_dict: dict[str, dict[str, str]],
399
- mocker: MockerFixture,
400
- ):
401
- pw_generated = "1N5j7oksB45l8w0RJD8qR0ENJP1yOAOs" # notsecret
402
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
403
- oc.get.side_effect = [None, db_secret_dict]
404
- mocker.patch(
405
- "reconcile.database_access_manager._generate_password",
406
- return_value=pw_generated,
407
- )
408
- p = _create_database_connection_parameter(
409
- db_access=db_access,
410
- namespace_name="foo",
411
- oc=oc,
412
- admin_secret_name="db-secret",
413
- user_secret_name="db-user-secret",
414
- )
415
- conn = DatabaseConnectionParameters(
416
- host="localhost",
417
- port="5432",
418
- user="test",
419
- password=pw_generated,
420
- database="test",
421
- )
422
-
423
- admin_conn = conn.copy()
424
- admin_conn.password = "hduhsdfuhsdf"
425
-
426
- assert p["user"] == conn
427
- assert p["admin"] == admin_conn
428
- assert oc.get.call_count == 2
429
-
430
-
431
- def test_generate_password():
432
- assert len(_generate_password()) == 32
433
- assert _generate_password() != _generate_password()
434
-
435
-
436
- @pytest.fixture
437
- def dbam_state(mocker: MockerFixture) -> MockerFixture:
438
- return mocker.patch("reconcile.database_access_manager.State", autospec=True)
439
-
440
-
441
- @pytest.fixture
442
- def vault_mock(mocker: MockerFixture) -> MockerFixture:
443
- return mocker.patch("reconcile.utils.vault._VaultClient", autospec=True)
444
-
445
-
446
- @pytest.fixture
447
- def dbam_process_mocks(
448
- openshift_resource_secet: OpenshiftResource,
449
- mocker: MockerFixture,
450
- db_connection_parameter: DatabaseConnectionParameters,
451
- db_admin_connection_parameter: DatabaseConnectionParameters,
452
- ) -> DBAMResource:
453
- expected_resource = DBAMResource(resource=openshift_resource_secet, clean_up=True)
454
- mocker.patch(
455
- "reconcile.database_access_manager._create_database_connection_parameter",
456
- return_value=_DBDonnections(
457
- user=db_connection_parameter,
458
- admin=db_admin_connection_parameter,
459
- ),
460
- )
461
- mocker.patch(
462
- "reconcile.database_access_manager._populate_resources",
463
- return_value=[expected_resource],
464
- )
465
- return expected_resource
466
-
467
-
468
- @pytest.fixture
469
- def ai_settings() -> dict[str, Any]:
470
- d: dict[str, Any] = defaultdict(str)
471
- d["sqlQuery"] = {
472
- "imageRepository": {"foo": "bar"},
473
- "pullSecret": {"foo": "bar"},
474
- }
475
- return d
476
-
477
-
478
- def test__process_db_access_job_pass(
479
- db_access: DatabaseAccessV1,
480
- db_access_namespace: NamespaceV1,
481
- dbam_state: MagicMock,
482
- dbam_process_mocks: DBAMResource,
483
- mocker: MockerFixture,
484
- ai_settings: dict[str, Any],
485
- vault_mock: MagicMock,
486
- ):
487
- dbam_state.exists.return_value = False
488
- dbam_state.get.return_value = db_access
489
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
490
- oc.get.return_value = {"status": {"conditions": [{"type": "Complete"}]}}
491
-
492
- oc_map = mocker.patch("reconcile.database_access_manager.OC_Map", autospec=True)
493
- oc_map.return_value.__enter__.return_value = oc_map
494
- oc_map.get_cluster.return_value = oc
495
-
496
- ob_delete = mocker.patch(
497
- "reconcile.database_access_manager.openshift_base.delete", autospec=True
498
- )
499
-
500
- _process_db_access(
501
- False,
502
- dbam_state,
503
- db_access,
504
- namespace=db_access_namespace,
505
- admin_secret_name="db-secret",
506
- engine="postgres",
507
- settings=ai_settings,
508
- vault_output_path="foo",
509
- vault_client=vault_mock,
510
- )
511
-
512
- vault_mock.write.assert_called_once_with(
513
- {
514
- "path": "foo/database-access-manager/test-cluster/test-namespace/test",
515
- "data": {
516
- "host": "localhost",
517
- "port": "5432",
518
- "user": "test",
519
- "password": "postgres",
520
- "database": "user",
521
- },
522
- },
523
- decode_base64=False,
524
- )
525
-
526
- assert ob_delete.call_count == 1
527
- ob_delete.assert_called_once_with(
528
- dry_run=False,
529
- oc_map=oc_map,
530
- cluster="test-cluster",
531
- namespace="test-namespace",
532
- resource_type="secret",
533
- name=dbam_process_mocks.resource.name,
534
- enable_deletion=True,
535
- )
536
-
537
-
538
- def test__process_db_access_job_error(
539
- db_access: DatabaseAccessV1,
540
- dbam_state: MagicMock,
541
- db_access_namespace: NamespaceV1,
542
- dbam_process_mocks: DBAMResource,
543
- mocker: MockerFixture,
544
- ai_settings: dict[str, Any],
545
- vault_mock: MagicMock,
546
- ):
547
- dbam_state.exists.return_value = False
548
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
549
- oc.get.return_value = {"status": {"conditions": [{"type": "Failed"}]}}
550
- oc_map = mocker.patch("reconcile.database_access_manager.OC_Map", autospec=True)
551
- oc_map.return_value.__enter__.return_value = oc_map
552
- oc_map.get_cluster.return_value = oc
553
-
554
- with pytest.raises(JobFailedError):
555
- _process_db_access(
556
- False,
557
- dbam_state,
558
- db_access,
559
- namespace=db_access_namespace,
560
- admin_secret_name="db-secret",
561
- engine="postgres",
562
- settings=ai_settings,
563
- vault_output_path="foo",
564
- vault_client=vault_mock,
565
- )
566
-
567
-
568
- def test__process_db_access_state_diff(
569
- db_access: DatabaseAccessV1,
570
- dbam_state: MagicMock,
571
- db_access_namespace: NamespaceV1,
572
- dbam_process_mocks: DBAMResource,
573
- mocker: MockerFixture,
574
- ai_settings: dict[str, Any],
575
- vault_mock: MagicMock,
576
- ):
577
- dba_current = db_access.dict(by_alias=True)
578
- dba_current["access"] = [{"grants": ["SELECT"], "target": {"dbschema": "test"}}]
579
- dbam_state.get.return_value = dba_current
580
- oc = mocker.patch("reconcile.utils.oc.OCNative", autospec=True)
581
- oc.get.return_value = False
582
- oc_map = mocker.patch("reconcile.database_access_manager.OC_Map", autospec=True)
583
- oc_map.return_value.__enter__.return_value = oc_map
584
- oc_map.get_cluster.return_value = oc
585
-
586
- ob_apply = mocker.patch(
587
- "reconcile.database_access_manager.openshift_base.apply", autospec=True
588
- )
589
- _process_db_access(
590
- False,
591
- dbam_state,
592
- db_access,
593
- namespace=db_access_namespace,
594
- admin_secret_name="db-secret",
595
- engine="postgres",
596
- settings=ai_settings,
597
- vault_output_path="foo",
598
- vault_client=vault_mock,
599
- )
600
-
601
- assert ob_apply.call_count == 1
602
- ob_apply.assert_called_once_with(
603
- dry_run=False,
604
- oc_map=oc_map,
605
- cluster="test-cluster",
606
- namespace="test-namespace",
607
- resource_type="secret",
608
- resource=dbam_process_mocks.resource,
609
- wait_for_namespace=False,
610
- )
611
-
612
-
613
- @pytest.mark.parametrize("field", ["database", "username"])
614
- def test__process_db_access_value_error_database(
615
- db_access: DatabaseAccessV1,
616
- dbam_state: MagicMock,
617
- db_access_namespace: NamespaceV1,
618
- dbam_process_mocks: DBAMResource,
619
- ai_settings: dict[str, Any],
620
- field: str,
621
- vault_mock: MagicMock,
622
- ):
623
- dba_current = db_access.dict(by_alias=True)
624
- dba_current[field] = "foo"
625
- dbam_state.get.return_value = dba_current
626
-
627
- with pytest.raises(ValueError):
628
- _process_db_access(
629
- False,
630
- dbam_state,
631
- db_access,
632
- namespace=db_access_namespace,
633
- admin_secret_name="db-secret",
634
- engine="postgres",
635
- settings=ai_settings,
636
- vault_output_path="foo",
637
- vault_client=vault_mock,
638
- )
639
-
640
-
641
- def test__process_db_access_state_exists_matched(
642
- db_access: DatabaseAccessV1,
643
- db_access_namespace: NamespaceV1,
644
- dbam_state: MagicMock,
645
- vault_mock: MagicMock,
646
- ):
647
- dbam_state.exists.return_value = True
648
- dbam_state.get.return_value = db_access.dict(by_alias=True)
649
- # missing mocks would cause this to fail if not exit early
650
- _process_db_access(
651
- False,
652
- dbam_state,
653
- db_access,
654
- namespace=db_access_namespace,
655
- admin_secret_name="db-secret",
656
- engine="postgres",
657
- settings=defaultdict(str),
658
- vault_output_path="foo",
659
- vault_client=vault_mock,
660
- )