qontract-reconcile 0.10.1rc1202__py3-none-any.whl → 0.10.2.dev2__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (138) hide show
  1. qontract_reconcile-0.10.2.dev2.dist-info/METADATA +500 -0
  2. {qontract_reconcile-0.10.1rc1202.dist-info → qontract_reconcile-0.10.2.dev2.dist-info}/RECORD +12 -130
  3. {qontract_reconcile-0.10.1rc1202.dist-info → qontract_reconcile-0.10.2.dev2.dist-info}/WHEEL +1 -2
  4. {qontract_reconcile-0.10.1rc1202.dist-info → qontract_reconcile-0.10.2.dev2.dist-info}/entry_points.txt +1 -0
  5. reconcile/aws_account_manager/README.md +5 -0
  6. reconcile/change_owners/README.md +34 -0
  7. reconcile/glitchtip/README.md +150 -0
  8. reconcile/gql_definitions/introspection.json +51176 -0
  9. reconcile/run_integration.py +293 -0
  10. reconcile/utils/binary.py +2 -2
  11. reconcile/utils/mr/README.md +198 -0
  12. reconcile/utils/oc_map.py +2 -2
  13. tools/qontract_cli.py +0 -0
  14. qontract_reconcile-0.10.1rc1202.dist-info/METADATA +0 -64
  15. qontract_reconcile-0.10.1rc1202.dist-info/top_level.txt +0 -3
  16. reconcile/test/__init__.py +0 -0
  17. reconcile/test/conftest.py +0 -157
  18. reconcile/test/fixtures.py +0 -24
  19. reconcile/test/saas_auto_promotions_manager/__init__.py +0 -0
  20. reconcile/test/saas_auto_promotions_manager/conftest.py +0 -170
  21. reconcile/test/saas_auto_promotions_manager/merge_request_manager/__init__.py +0 -0
  22. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/__init__.py +0 -0
  23. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/conftest.py +0 -115
  24. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/data_keys.py +0 -19
  25. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_desired_state.py +0 -66
  26. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_merge_request_manager.py +0 -86
  27. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_mr_parser.py +0 -352
  28. reconcile/test/saas_auto_promotions_manager/merge_request_manager/merge_request_manager/test_reconciler.py +0 -494
  29. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/__init__.py +0 -0
  30. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/conftest.py +0 -25
  31. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_multiple_namespaces.py +0 -37
  32. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_single_namespace.py +0 -81
  33. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_content_single_target.py +0 -61
  34. reconcile/test/saas_auto_promotions_manager/merge_request_manager/renderer/test_json_path_selector.py +0 -74
  35. reconcile/test/saas_auto_promotions_manager/test_integration_test.py +0 -52
  36. reconcile/test/saas_auto_promotions_manager/utils/__init__.py +0 -0
  37. reconcile/test/test_acs_notifiers.py +0 -393
  38. reconcile/test/test_acs_policies.py +0 -497
  39. reconcile/test/test_acs_rbac.py +0 -865
  40. reconcile/test/test_aggregated_list.py +0 -237
  41. reconcile/test/test_amtool.py +0 -37
  42. reconcile/test/test_aws_ami_cleanup.py +0 -230
  43. reconcile/test/test_aws_ami_share.py +0 -68
  44. reconcile/test/test_aws_cloudwatch_log_retention.py +0 -434
  45. reconcile/test/test_aws_iam_keys.py +0 -70
  46. reconcile/test/test_aws_iam_password_reset.py +0 -35
  47. reconcile/test/test_aws_support_cases_sos.py +0 -23
  48. reconcile/test/test_checkpoint.py +0 -178
  49. reconcile/test/test_cli.py +0 -41
  50. reconcile/test/test_closedbox_endpoint_monitoring.py +0 -207
  51. reconcile/test/test_dashdotdb_dora.py +0 -245
  52. reconcile/test/test_database_access_manager.py +0 -660
  53. reconcile/test/test_deadmanssnitch.py +0 -290
  54. reconcile/test/test_gabi_authorized_users.py +0 -72
  55. reconcile/test/test_gcr_mirror.py +0 -14
  56. reconcile/test/test_github_org.py +0 -156
  57. reconcile/test/test_github_repo_invites.py +0 -119
  58. reconcile/test/test_gitlab_housekeeping.py +0 -333
  59. reconcile/test/test_gitlab_labeler.py +0 -126
  60. reconcile/test/test_gitlab_members.py +0 -219
  61. reconcile/test/test_gitlab_permissions.py +0 -164
  62. reconcile/test/test_instrumented_wrappers.py +0 -18
  63. reconcile/test/test_integrations_manager.py +0 -1252
  64. reconcile/test/test_jenkins_worker_fleets.py +0 -57
  65. reconcile/test/test_jira_permissions_validator.py +0 -519
  66. reconcile/test/test_jump_host.py +0 -114
  67. reconcile/test/test_ldap_users.py +0 -125
  68. reconcile/test/test_make.py +0 -28
  69. reconcile/test/test_ocm_additional_routers.py +0 -133
  70. reconcile/test/test_ocm_clusters.py +0 -798
  71. reconcile/test/test_ocm_clusters_manifest_updates.py +0 -87
  72. reconcile/test/test_ocm_machine_pools.py +0 -1103
  73. reconcile/test/test_ocm_update_recommended_version.py +0 -145
  74. reconcile/test/test_ocm_upgrade_scheduler_org_updater.py +0 -125
  75. reconcile/test/test_openshift_base.py +0 -1269
  76. reconcile/test/test_openshift_cluster_bots.py +0 -240
  77. reconcile/test/test_openshift_namespace_labels.py +0 -344
  78. reconcile/test/test_openshift_namespaces.py +0 -256
  79. reconcile/test/test_openshift_resource.py +0 -443
  80. reconcile/test/test_openshift_resources_base.py +0 -478
  81. reconcile/test/test_openshift_saas_deploy.py +0 -188
  82. reconcile/test/test_openshift_saas_deploy_change_tester.py +0 -308
  83. reconcile/test/test_openshift_saas_deploy_trigger_cleaner.py +0 -65
  84. reconcile/test/test_openshift_serviceaccount_tokens.py +0 -282
  85. reconcile/test/test_openshift_tekton_resources.py +0 -265
  86. reconcile/test/test_openshift_upgrade_watcher.py +0 -223
  87. reconcile/test/test_prometheus_rules_tester.py +0 -151
  88. reconcile/test/test_quay_membership.py +0 -86
  89. reconcile/test/test_quay_mirror.py +0 -172
  90. reconcile/test/test_quay_mirror_org.py +0 -82
  91. reconcile/test/test_quay_repos.py +0 -59
  92. reconcile/test/test_queries.py +0 -53
  93. reconcile/test/test_repo_owners.py +0 -47
  94. reconcile/test/test_requests_sender.py +0 -139
  95. reconcile/test/test_saasherder.py +0 -1611
  96. reconcile/test/test_saasherder_allowed_secret_paths.py +0 -125
  97. reconcile/test/test_secret_reader.py +0 -153
  98. reconcile/test/test_slack_base.py +0 -183
  99. reconcile/test/test_slack_usergroups.py +0 -785
  100. reconcile/test/test_sql_query.py +0 -316
  101. reconcile/test/test_status_board.py +0 -258
  102. reconcile/test/test_terraform_aws_route53.py +0 -29
  103. reconcile/test/test_terraform_cloudflare_dns.py +0 -117
  104. reconcile/test/test_terraform_cloudflare_resources.py +0 -408
  105. reconcile/test/test_terraform_cloudflare_users.py +0 -747
  106. reconcile/test/test_terraform_repo.py +0 -440
  107. reconcile/test/test_terraform_resources.py +0 -519
  108. reconcile/test/test_terraform_tgw_attachments.py +0 -1295
  109. reconcile/test/test_terraform_users.py +0 -152
  110. reconcile/test/test_terraform_vpc_peerings.py +0 -576
  111. reconcile/test/test_terraform_vpc_peerings_build_desired_state.py +0 -1434
  112. reconcile/test/test_three_way_diff_strategy.py +0 -131
  113. reconcile/test/test_utils_jinja2.py +0 -130
  114. reconcile/test/test_vault_replication.py +0 -534
  115. reconcile/test/test_vault_utils.py +0 -47
  116. reconcile/test/test_version_bump.py +0 -18
  117. reconcile/test/test_vpc_peerings_validator.py +0 -194
  118. reconcile/test/test_wrong_region.py +0 -78
  119. release/__init__.py +0 -0
  120. release/test_version.py +0 -50
  121. release/version.py +0 -104
  122. tools/cli_commands/test/__init__.py +0 -0
  123. tools/cli_commands/test/conftest.py +0 -332
  124. tools/cli_commands/test/test_aws_cost_report.py +0 -258
  125. tools/cli_commands/test/test_cost_management_api.py +0 -326
  126. tools/cli_commands/test/test_gpg_encrypt.py +0 -235
  127. tools/cli_commands/test/test_openshift_cost_optimization_report.py +0 -255
  128. tools/cli_commands/test/test_openshift_cost_report.py +0 -295
  129. tools/cli_commands/test/test_util.py +0 -70
  130. tools/test/__init__.py +0 -0
  131. tools/test/conftest.py +0 -77
  132. tools/test/test_app_interface_metrics_exporter.py +0 -48
  133. tools/test/test_erv2.py +0 -80
  134. tools/test/test_get_container_images.py +0 -230
  135. tools/test/test_qontract_cli.py +0 -197
  136. tools/test/test_saas_promotion_state.py +0 -187
  137. tools/test/test_sd_app_sre_alert_report.py +0 -74
  138. tools/test/test_sre_checkpoints.py +0 -79
@@ -1,865 +0,0 @@
1
- import copy
2
- from unittest.mock import Mock
3
-
4
- import pytest
5
- from pytest_mock import MockerFixture
6
-
7
- from reconcile.acs_rbac import (
8
- AcsAccessScope,
9
- AcsRbacIntegration,
10
- AcsRole,
11
- AssignmentPair,
12
- )
13
- from reconcile.gql_definitions.acs.acs_rbac import (
14
- AcsRbacQueryData,
15
- ClusterV1,
16
- NamespaceV1,
17
- NamespaceV1_ClusterV1,
18
- OidcPermissionAcsV1,
19
- RoleV1,
20
- UserV1,
21
- )
22
- from reconcile.utils.acs import rbac
23
-
24
- AUTH_PROVIDER_ID = "6a41743c-792b-11ee-b962-0242ac120002"
25
-
26
-
27
- @pytest.fixture
28
- def query_data_desired_state() -> AcsRbacQueryData:
29
- return AcsRbacQueryData(
30
- acs_rbacs=[
31
- UserV1(
32
- org_username="foo",
33
- roles=[
34
- RoleV1(
35
- name="app-sre-admin",
36
- oidc_permissions=[
37
- OidcPermissionAcsV1(
38
- name="app-sre-acs-admin",
39
- description="admin access to acs instance",
40
- service="acs",
41
- permission_set="admin",
42
- clusters=[],
43
- namespaces=[],
44
- )
45
- ],
46
- )
47
- ],
48
- ),
49
- UserV1(
50
- org_username="bar",
51
- roles=[
52
- RoleV1(
53
- name="app-sre-admin",
54
- oidc_permissions=[
55
- OidcPermissionAcsV1(
56
- name="app-sre-acs-admin",
57
- description="admin access to acs instance",
58
- service="acs",
59
- permission_set="admin",
60
- clusters=[],
61
- namespaces=[],
62
- )
63
- ],
64
- )
65
- ],
66
- ),
67
- UserV1(
68
- org_username="foofoo",
69
- roles=[
70
- RoleV1(
71
- name="tenant-role-a",
72
- oidc_permissions=[
73
- OidcPermissionAcsV1(
74
- name="cluster-analyst",
75
- description="analyst access to clusters in acs instance",
76
- service="acs",
77
- permission_set="analyst",
78
- clusters=[
79
- ClusterV1(name="clusterA"),
80
- ClusterV1(name="clusterB"),
81
- ],
82
- namespaces=[],
83
- )
84
- ],
85
- )
86
- ],
87
- ),
88
- UserV1(
89
- org_username="barbar",
90
- roles=[
91
- RoleV1(
92
- name="tenant-role-a",
93
- oidc_permissions=[
94
- OidcPermissionAcsV1(
95
- name="cluster-analyst",
96
- description="analyst access to clusters in acs instance",
97
- service="acs",
98
- permission_set="analyst",
99
- clusters=[
100
- ClusterV1(name="clusterA"),
101
- ClusterV1(name="clusterB"),
102
- ],
103
- namespaces=[],
104
- )
105
- ],
106
- )
107
- ],
108
- ),
109
- UserV1(
110
- org_username="foobar",
111
- roles=[
112
- RoleV1(
113
- name="tenant-role-b",
114
- oidc_permissions=[
115
- OidcPermissionAcsV1(
116
- name="service-vuln-admin",
117
- description="vuln-admin access to service namespaces in acs instance",
118
- service="acs",
119
- permission_set="vuln-admin",
120
- clusters=[],
121
- namespaces=[
122
- NamespaceV1(
123
- name="serviceA-stage",
124
- cluster=NamespaceV1_ClusterV1(
125
- name="stage-cluster"
126
- ),
127
- ),
128
- NamespaceV1(
129
- name="serviceA-prod",
130
- cluster=NamespaceV1_ClusterV1(
131
- name="prod-cluster"
132
- ),
133
- ),
134
- ],
135
- )
136
- ],
137
- )
138
- ],
139
- ),
140
- ]
141
- )
142
-
143
-
144
- @pytest.fixture
145
- def modeled_acs_roles() -> list[AcsRole]:
146
- return [
147
- AcsRole(
148
- name="app-sre-acs-admin",
149
- description="admin access to acs instance",
150
- assignments=[
151
- AssignmentPair(key="userid", value="foo"),
152
- AssignmentPair(key="userid", value="bar"),
153
- ],
154
- permission_set_name="Admin",
155
- access_scope=AcsAccessScope(
156
- name="Unrestricted",
157
- description="Access to all clusters and namespaces",
158
- clusters=[],
159
- namespaces=[],
160
- ),
161
- system_default=False,
162
- ),
163
- AcsRole(
164
- name="cluster-analyst",
165
- description="analyst access to clusters in acs instance",
166
- assignments=[
167
- AssignmentPair(key="userid", value="foofoo"),
168
- AssignmentPair(key="userid", value="barbar"),
169
- ],
170
- permission_set_name="Analyst",
171
- access_scope=AcsAccessScope(
172
- name="cluster-analyst",
173
- description="analyst access to clusters in acs instance",
174
- clusters=["clusterA", "clusterB"],
175
- namespaces=[],
176
- ),
177
- system_default=False,
178
- ),
179
- AcsRole(
180
- name="service-vuln-admin",
181
- description="vuln-admin access to service namespaces in acs instance",
182
- assignments=[AssignmentPair(key="userid", value="foobar")],
183
- permission_set_name="Vulnerability Management Admin",
184
- access_scope=AcsAccessScope(
185
- name="service-vuln-admin",
186
- description="vuln-admin access to service namespaces in acs instance",
187
- clusters=[],
188
- namespaces=[
189
- {"clusterName": "stage-cluster", "namespaceName": "serviceA-stage"},
190
- {"clusterName": "prod-cluster", "namespaceName": "serviceA-prod"},
191
- ],
192
- ),
193
- system_default=False,
194
- ),
195
- ]
196
-
197
-
198
- @pytest.fixture
199
- def api_response_roles() -> list[rbac.Role]:
200
- return [
201
- rbac.Role(
202
- api_data={
203
- "name": "app-sre-acs-admin",
204
- "permissionSetId": "1",
205
- "accessScopeId": "1",
206
- "description": "admin access to acs instance",
207
- "system_default": False,
208
- }
209
- ),
210
- rbac.Role(
211
- api_data={
212
- "name": "cluster-analyst",
213
- "permissionSetId": "2",
214
- "accessScopeId": "2",
215
- "description": "analyst access to clusters in acs instance",
216
- "system_default": False,
217
- }
218
- ),
219
- rbac.Role(
220
- api_data={
221
- "name": "service-vuln-admin",
222
- "permissionSetId": "3",
223
- "accessScopeId": "3",
224
- "description": "vuln-admin access to service namespaces in acs instance",
225
- "system_default": False,
226
- }
227
- ),
228
- ]
229
-
230
-
231
- @pytest.fixture
232
- def api_response_groups() -> list[rbac.Group]:
233
- return [
234
- rbac.Group(
235
- api_data={
236
- "roleName": "app-sre-acs-admin",
237
- "props": {
238
- "id": "1",
239
- "authProviderId": AUTH_PROVIDER_ID,
240
- "key": "userid",
241
- "value": "foo",
242
- },
243
- }
244
- ),
245
- rbac.Group(
246
- api_data={
247
- "roleName": "app-sre-acs-admin",
248
- "props": {
249
- "id": "2",
250
- "authProviderId": AUTH_PROVIDER_ID,
251
- "key": "userid",
252
- "value": "bar",
253
- },
254
- }
255
- ),
256
- rbac.Group(
257
- api_data={
258
- "roleName": "cluster-analyst",
259
- "props": {
260
- "id": "3",
261
- "authProviderId": AUTH_PROVIDER_ID,
262
- "key": "userid",
263
- "value": "foofoo",
264
- },
265
- }
266
- ),
267
- rbac.Group(
268
- api_data={
269
- "roleName": "cluster-analyst",
270
- "props": {
271
- "id": "4",
272
- "authProviderId": AUTH_PROVIDER_ID,
273
- "key": "userid",
274
- "value": "barbar",
275
- },
276
- }
277
- ),
278
- rbac.Group(
279
- api_data={
280
- "roleName": "service-vuln-admin",
281
- "props": {
282
- "id": "5",
283
- "authProviderId": AUTH_PROVIDER_ID,
284
- "key": "userid",
285
- "value": "foobar",
286
- },
287
- }
288
- ),
289
- ]
290
-
291
-
292
- @pytest.fixture
293
- def api_response_access_scopes() -> list[rbac.AccessScope]:
294
- return [
295
- rbac.AccessScope(
296
- api_data={
297
- "id": "1",
298
- "name": "Unrestricted",
299
- "description": "Access to all clusters and namespaces",
300
- "rules": None,
301
- }
302
- ),
303
- rbac.AccessScope(
304
- api_data={
305
- "id": "2",
306
- "name": "cluster-analyst",
307
- "description": "analyst access to clusters in acs instance",
308
- "rules": {
309
- "includedClusters": ["clusterA", "clusterB"],
310
- "includedNamespaces": [],
311
- },
312
- }
313
- ),
314
- rbac.AccessScope(
315
- api_data={
316
- "id": "3",
317
- "name": "service-vuln-admin",
318
- "description": "vuln-admin access to service namespaces in acs instance",
319
- "rules": {
320
- "includedClusters": [],
321
- "includedNamespaces": [
322
- {
323
- "clusterName": "stage-cluster",
324
- "namespaceName": "serviceA-stage",
325
- },
326
- {
327
- "clusterName": "prod-cluster",
328
- "namespaceName": "serviceA-prod",
329
- },
330
- ],
331
- },
332
- }
333
- ),
334
- ]
335
-
336
-
337
- @pytest.fixture
338
- def api_response_permission_sets() -> list[rbac.PermissionSet]:
339
- return [
340
- rbac.PermissionSet(
341
- api_data={
342
- "id": "1",
343
- "name": "Admin",
344
- }
345
- ),
346
- rbac.PermissionSet(
347
- api_data={
348
- "id": "2",
349
- "name": "Analyst",
350
- }
351
- ),
352
- rbac.PermissionSet(
353
- api_data={
354
- "id": "3",
355
- "name": "Vulnerability Management Admin",
356
- }
357
- ),
358
- ]
359
-
360
-
361
- def test_get_desired_state(
362
- mocker: MockerFixture,
363
- query_data_desired_state: AcsRbacQueryData,
364
- modeled_acs_roles: list[AcsRole],
365
- ):
366
- query_func = mocker.patch("reconcile.acs_rbac.acs_rbac_query", autospec=True)
367
- query_func.return_value = query_data_desired_state
368
-
369
- integration = AcsRbacIntegration()
370
- result = integration.get_desired_state(query_func)
371
-
372
- assert result == modeled_acs_roles
373
-
374
-
375
- def test_get_current_state(
376
- modeled_acs_roles: list[AcsRole],
377
- api_response_roles: list[rbac.Role],
378
- api_response_groups: list[rbac.Group],
379
- api_response_access_scopes: list[rbac.AccessScope],
380
- api_response_permission_sets: list[rbac.PermissionSet],
381
- ):
382
- integration = AcsRbacIntegration()
383
- result = integration.get_current_state(
384
- AUTH_PROVIDER_ID,
385
- rbac.RbacResources(
386
- roles=api_response_roles,
387
- access_scopes=api_response_access_scopes,
388
- groups=api_response_groups,
389
- permission_sets=api_response_permission_sets,
390
- ),
391
- )
392
-
393
- assert result == modeled_acs_roles
394
-
395
-
396
- def test_add_rbac_dry_run(
397
- mocker: MockerFixture,
398
- modeled_acs_roles: list[AcsRole],
399
- api_response_access_scopes: list[rbac.AccessScope],
400
- api_response_permission_sets: list[rbac.PermissionSet],
401
- ):
402
- dry_run = True
403
- desired = modeled_acs_roles
404
-
405
- current = modeled_acs_roles[:-1]
406
- current_access_scopes = api_response_access_scopes[:-1]
407
-
408
- acs_mock = Mock()
409
-
410
- rbac_api_resources = rbac.RbacResources(
411
- roles=[],
412
- access_scopes=current_access_scopes,
413
- groups=[],
414
- permission_sets=api_response_permission_sets,
415
- )
416
- mocker.patch.object(
417
- acs_mock, "create_access_scope", side_effect=[api_response_access_scopes[2].id]
418
- )
419
- mocker.patch.object(acs_mock, "create_role")
420
- mocker.patch.object(acs_mock, "create_group_batch")
421
-
422
- integration = AcsRbacIntegration()
423
- integration.reconcile(
424
- desired=desired,
425
- current=current,
426
- rbac_api_resources=rbac_api_resources,
427
- acs=acs_mock,
428
- auth_provider_id=AUTH_PROVIDER_ID,
429
- dry_run=dry_run,
430
- )
431
-
432
- acs_mock.create_access_scope.assert_not_called()
433
- acs_mock.create_role.assert_not_called()
434
- acs_mock.create_group_batch.assert_not_called()
435
-
436
-
437
- def test_add_rbac(
438
- mocker: MockerFixture,
439
- modeled_acs_roles: list[AcsRole],
440
- api_response_access_scopes: list[rbac.AccessScope],
441
- api_response_permission_sets: list[rbac.PermissionSet],
442
- ):
443
- dry_run = False
444
- desired = modeled_acs_roles
445
-
446
- current = modeled_acs_roles[:-1]
447
- current_access_scopes = api_response_access_scopes[:-1]
448
-
449
- acs_mock = Mock()
450
-
451
- rbac_api_resources = rbac.RbacResources(
452
- roles=[],
453
- access_scopes=current_access_scopes,
454
- groups=[],
455
- permission_sets=api_response_permission_sets,
456
- )
457
- mocker.patch.object(
458
- acs_mock, "create_access_scope", side_effect=[api_response_access_scopes[2].id]
459
- )
460
- mocker.patch.object(acs_mock, "create_role")
461
- mocker.patch.object(acs_mock, "create_group_batch")
462
-
463
- integration = AcsRbacIntegration()
464
- integration.reconcile(
465
- desired=desired,
466
- current=current,
467
- rbac_api_resources=rbac_api_resources,
468
- acs=acs_mock,
469
- auth_provider_id=AUTH_PROVIDER_ID,
470
- dry_run=dry_run,
471
- )
472
-
473
- acs_mock.create_access_scope.assert_has_calls([
474
- mocker.call(
475
- desired[2].access_scope.name,
476
- desired[2].access_scope.description,
477
- desired[2].access_scope.clusters,
478
- desired[2].access_scope.namespaces,
479
- ),
480
- ])
481
- acs_mock.create_role.assert_has_calls([
482
- mocker.call(
483
- desired[2].name,
484
- desired[2].description,
485
- api_response_permission_sets[2].id,
486
- api_response_access_scopes[2].id,
487
- ),
488
- ])
489
- acs_mock.create_group_batch.assert_has_calls([
490
- mocker.call([
491
- rbac.AcsRbacApi.GroupAdd(
492
- role_name=desired[2].name,
493
- key=a.key,
494
- value=a.value,
495
- auth_provider_id=AUTH_PROVIDER_ID,
496
- )
497
- for a in desired[2].assignments
498
- ])
499
- ])
500
-
501
-
502
- def test_delete_rbac_dry_run(
503
- mocker: MockerFixture,
504
- modeled_acs_roles: list[AcsRole],
505
- api_response_access_scopes: list[rbac.AccessScope],
506
- api_response_groups: list[rbac.Group],
507
- ):
508
- dry_run = True
509
- current = modeled_acs_roles
510
- desired = modeled_acs_roles[:-1] # remove 'cluster-analyst' role
511
-
512
- acs_mock = Mock()
513
-
514
- rbac_api_resources = rbac.RbacResources(
515
- roles=[],
516
- access_scopes=api_response_access_scopes,
517
- groups=api_response_groups,
518
- permission_sets=[],
519
- )
520
- mocker.patch.object(acs_mock, "delete_role")
521
- mocker.patch.object(acs_mock, "delete_group_batch")
522
- mocker.patch.object(acs_mock, "delete_access_scope")
523
-
524
- integration = AcsRbacIntegration()
525
- integration.reconcile(
526
- desired=desired,
527
- current=current,
528
- rbac_api_resources=rbac_api_resources,
529
- acs=acs_mock,
530
- auth_provider_id=AUTH_PROVIDER_ID,
531
- dry_run=dry_run,
532
- )
533
-
534
- acs_mock.delete_role.assert_not_called()
535
- acs_mock.delete_group_batch.assert_not_called()
536
- acs_mock.delete_access_scope.assert_not_called()
537
-
538
-
539
- def test_delete_rbac(
540
- mocker: MockerFixture,
541
- modeled_acs_roles: list[AcsRole],
542
- api_response_access_scopes: list[rbac.AccessScope],
543
- api_response_groups: list[rbac.Group],
544
- ):
545
- dry_run = False
546
- current = modeled_acs_roles
547
- desired = (
548
- modeled_acs_roles[:1] + modeled_acs_roles[2:]
549
- ) # remove 'cluster-analyst' role
550
-
551
- acs_mock = Mock()
552
-
553
- rbac_api_resources = rbac.RbacResources(
554
- roles=[],
555
- access_scopes=api_response_access_scopes,
556
- groups=api_response_groups,
557
- permission_sets=[],
558
- )
559
- mocker.patch.object(acs_mock, "delete_role")
560
- mocker.patch.object(acs_mock, "delete_group_batch")
561
- mocker.patch.object(acs_mock, "delete_access_scope")
562
-
563
- integration = AcsRbacIntegration()
564
- integration.reconcile(
565
- desired=desired,
566
- current=current,
567
- rbac_api_resources=rbac_api_resources,
568
- acs=acs_mock,
569
- auth_provider_id=AUTH_PROVIDER_ID,
570
- dry_run=dry_run,
571
- )
572
-
573
- acs_mock.delete_role.assert_has_calls([mocker.call(current[1].name)])
574
- acs_mock.delete_group_batch.assert_has_calls([
575
- mocker.call([api_response_groups[2], api_response_groups[3]])
576
- ])
577
- acs_mock.delete_access_scope.assert_has_calls([
578
- mocker.call(api_response_access_scopes[1].id)
579
- ])
580
-
581
-
582
- def test_update_rbac_groups_only(
583
- mocker: MockerFixture,
584
- modeled_acs_roles: list[AcsRole],
585
- api_response_access_scopes: list[rbac.AccessScope],
586
- api_response_permission_sets: list[rbac.PermissionSet],
587
- api_response_groups: list[rbac.Group],
588
- ):
589
- dry_run = False
590
- desired = modeled_acs_roles
591
-
592
- current = copy.deepcopy(modeled_acs_roles)
593
- # change a user assignment in 'app-sre-acs-admin' role
594
- current[0].assignments[0].value = "lasagna"
595
- current_groups = copy.deepcopy(api_response_groups)
596
- current_groups[0].value = "lasagna"
597
-
598
- acs_mock = Mock()
599
-
600
- rbac_api_resources = rbac.RbacResources(
601
- roles=[],
602
- access_scopes=api_response_access_scopes,
603
- groups=current_groups,
604
- permission_sets=api_response_permission_sets,
605
- )
606
- mocker.patch.object(acs_mock, "update_group_batch")
607
- mocker.patch.object(acs_mock, "update_access_scope")
608
- mocker.patch.object(acs_mock, "update_role")
609
-
610
- integration = AcsRbacIntegration()
611
- integration.reconcile(
612
- desired=desired,
613
- current=current,
614
- rbac_api_resources=rbac_api_resources,
615
- acs=acs_mock,
616
- auth_provider_id=AUTH_PROVIDER_ID,
617
- dry_run=dry_run,
618
- )
619
-
620
- acs_mock.update_group_batch.assert_has_calls([
621
- mocker.call(
622
- [current_groups[0]],
623
- [
624
- rbac.AcsRbacApi.GroupAdd(
625
- role_name=desired[0].name,
626
- key=desired[0].assignments[0].key,
627
- value=desired[0].assignments[0].value,
628
- auth_provider_id=AUTH_PROVIDER_ID,
629
- )
630
- ],
631
- )
632
- ])
633
-
634
- acs_mock.update_access_scope.assert_not_called()
635
- acs_mock.update_role.assert_not_called()
636
-
637
-
638
- def test_full_reconcile(
639
- mocker: MockerFixture,
640
- modeled_acs_roles: list[AcsRole],
641
- api_response_access_scopes: list[rbac.AccessScope],
642
- api_response_permission_sets: list[rbac.PermissionSet],
643
- api_response_groups: list[rbac.Group],
644
- ):
645
- dry_run = False
646
-
647
- # trigger creation of new role and deletion of existing 'service-vuln-admin' role
648
- desired = modeled_acs_roles[:-1] + [
649
- AcsRole(
650
- name="new-role",
651
- description="add me",
652
- assignments=[
653
- AssignmentPair(key="userid", value="elsa"),
654
- AssignmentPair(key="userid", value="anna"),
655
- ],
656
- permission_set_name="Admin",
657
- access_scope=AcsAccessScope(
658
- name="Unrestricted",
659
- description="Access to all clusters and namespaces",
660
- clusters=[],
661
- namespaces=[],
662
- ),
663
- system_default=False,
664
- )
665
- ]
666
-
667
- current = copy.deepcopy(modeled_acs_roles)
668
- # change permission set to trigger update to existing 'cluster-analyst' role
669
- current[1].permission_set_name = "Vulnerability Management Admin"
670
- # remove a cluster from scope to trigger update to access scope of 'cluster-analyst'
671
- current[1].access_scope.clusters.pop()
672
- current_access_scopes = copy.deepcopy(api_response_access_scopes)
673
- current_access_scopes[1].clusters.pop()
674
-
675
- acs_mock = Mock()
676
-
677
- rbac_api_resources = rbac.RbacResources(
678
- roles=[],
679
- access_scopes=current_access_scopes,
680
- groups=api_response_groups,
681
- permission_sets=api_response_permission_sets,
682
- )
683
- mocker.patch.object(acs_mock, "create_access_scope")
684
- mocker.patch.object(acs_mock, "create_role")
685
- mocker.patch.object(acs_mock, "create_group_batch")
686
- mocker.patch.object(acs_mock, "delete_role")
687
- mocker.patch.object(acs_mock, "delete_group_batch")
688
- mocker.patch.object(acs_mock, "delete_access_scope")
689
- mocker.patch.object(acs_mock, "update_group_batch")
690
- mocker.patch.object(acs_mock, "update_access_scope")
691
- mocker.patch.object(acs_mock, "update_role")
692
-
693
- integration = AcsRbacIntegration()
694
- integration.reconcile(
695
- desired=desired,
696
- current=current,
697
- rbac_api_resources=rbac_api_resources,
698
- acs=acs_mock,
699
- auth_provider_id=AUTH_PROVIDER_ID,
700
- dry_run=dry_run,
701
- )
702
-
703
- acs_mock.create_role.assert_has_calls([
704
- mocker.call(
705
- desired[2].name,
706
- desired[2].description,
707
- api_response_permission_sets[0].id,
708
- api_response_access_scopes[0].id,
709
- ),
710
- ])
711
- acs_mock.create_group_batch.assert_has_calls([
712
- mocker.call([
713
- rbac.AcsRbacApi.GroupAdd(
714
- role_name=desired[2].name,
715
- key=a.key,
716
- value=a.value,
717
- auth_provider_id=AUTH_PROVIDER_ID,
718
- )
719
- for a in desired[2].assignments
720
- ])
721
- ])
722
-
723
- acs_mock.delete_role.assert_has_calls([mocker.call(current[2].name)])
724
- acs_mock.delete_group_batch.assert_has_calls([
725
- mocker.call([api_response_groups[4]])
726
- ])
727
- acs_mock.delete_access_scope.assert_has_calls([
728
- mocker.call(api_response_access_scopes[2].id)
729
- ])
730
-
731
- acs_mock.update_role.assert_has_calls([
732
- mocker.call(
733
- desired[1].name,
734
- desired[1].description,
735
- # use originals
736
- api_response_permission_sets[1].id,
737
- api_response_access_scopes[1].id,
738
- )
739
- ])
740
- acs_mock.update_access_scope.assert_has_calls([
741
- mocker.call(
742
- api_response_access_scopes[1].id,
743
- desired[1].access_scope.name,
744
- desired[1].access_scope.description,
745
- desired[1].access_scope.clusters,
746
- desired[1].access_scope.namespaces,
747
- )
748
- ])
749
-
750
- # new desired role is admin scope. Should use existing 'Unrestricted' system default
751
- acs_mock.create_access_scope.assert_not_called()
752
- acs_mock.update_group_batch.assert_not_called()
753
-
754
-
755
- def test_full_reconcile_with_errors(
756
- mocker: MockerFixture,
757
- modeled_acs_roles: list[AcsRole],
758
- api_response_access_scopes: list[rbac.AccessScope],
759
- api_response_permission_sets: list[rbac.PermissionSet],
760
- api_response_groups: list[rbac.Group],
761
- ):
762
- dry_run = False
763
-
764
- desired = modeled_acs_roles[:-1] + [
765
- AcsRole(
766
- name="new-role",
767
- description="add me",
768
- assignments=[
769
- AssignmentPair(key="userid", value="elsa"),
770
- AssignmentPair(key="userid", value="anna"),
771
- ],
772
- permission_set_name="Admin",
773
- access_scope=AcsAccessScope(
774
- name="Unrestricted",
775
- description="Access to all clusters and namespaces",
776
- clusters=[],
777
- namespaces=[],
778
- ),
779
- system_default=False,
780
- )
781
- ]
782
-
783
- current = copy.deepcopy(modeled_acs_roles)
784
- # change permission set to trigger update to existing 'cluster-analyst' role
785
- current[1].permission_set_name = "Vulnerability Management Admin"
786
- # remove a cluster from scope to trigger update to access scope of 'cluster-analyst'
787
- current[1].access_scope.clusters.pop()
788
- current_access_scopes = copy.deepcopy(api_response_access_scopes)
789
- current_access_scopes[1].clusters.pop()
790
-
791
- acs_mock = Mock()
792
-
793
- rbac_api_resources = rbac.RbacResources(
794
- roles=[],
795
- access_scopes=current_access_scopes,
796
- groups=api_response_groups,
797
- permission_sets=api_response_permission_sets,
798
- )
799
- mocker.patch.object(acs_mock, "create_access_scope")
800
- mocker.patch.object(
801
- acs_mock, "create_role", side_effect=Exception("Simulated error")
802
- )
803
- mocker.patch.object(acs_mock, "create_group_batch")
804
- mocker.patch.object(
805
- acs_mock, "delete_group_batch", side_effect=Exception("Simulated error")
806
- )
807
- mocker.patch.object(acs_mock, "delete_role")
808
- mocker.patch.object(acs_mock, "delete_access_scope")
809
- mocker.patch.object(acs_mock, "update_group_batch")
810
- mocker.patch.object(acs_mock, "update_access_scope")
811
- mocker.patch.object(acs_mock, "update_role")
812
-
813
- integration = AcsRbacIntegration()
814
- with pytest.raises(ExceptionGroup) as exc_info:
815
- integration.reconcile(
816
- desired=desired,
817
- current=current,
818
- rbac_api_resources=rbac_api_resources,
819
- acs=acs_mock,
820
- auth_provider_id=AUTH_PROVIDER_ID,
821
- dry_run=dry_run,
822
- )
823
-
824
- # call to 'create_role' failed. remaining create logic should be skipped
825
- acs_mock.create_role.assert_has_calls([
826
- mocker.call(
827
- desired[2].name,
828
- desired[2].description,
829
- api_response_permission_sets[0].id,
830
- api_response_access_scopes[0].id,
831
- ),
832
- ])
833
- acs_mock.create_group_batch.assert_not_called()
834
-
835
- acs_mock.delete_group_batch.assert_has_calls([
836
- mocker.call([api_response_groups[4]])
837
- ])
838
- # call to 'delete_group_batch' failed. remaining delete logic should be skipped
839
- acs_mock.delete_role.assert_not_called()
840
- acs_mock.delete_access_scope.assert_not_called()
841
-
842
- acs_mock.update_role.assert_has_calls([
843
- mocker.call(
844
- desired[1].name,
845
- desired[1].description,
846
- # use originals
847
- api_response_permission_sets[1].id,
848
- api_response_access_scopes[1].id,
849
- )
850
- ])
851
- acs_mock.update_access_scope.assert_has_calls([
852
- mocker.call(
853
- api_response_access_scopes[1].id,
854
- desired[1].access_scope.name,
855
- desired[1].access_scope.description,
856
- desired[1].access_scope.clusters,
857
- desired[1].access_scope.namespaces,
858
- )
859
- ])
860
-
861
- # new desired role is admin scope. Should use existing 'Unrestricted' system default
862
- acs_mock.create_access_scope.assert_not_called()
863
- acs_mock.update_group_batch.assert_not_called()
864
-
865
- assert "Reconcile errors occurred" in str(exc_info.value)