|
37 | 37 | from tests.unit.framework.mocks import MockBackend |
38 | 38 |
|
39 | 39 | _SECRET_PATTERN = r"{{(secrets.*?)}}" |
| 40 | +_SECRET_VALUE = b"SGVsbG8sIFdvcmxkIQ==" |
40 | 41 |
|
41 | 42 |
|
42 | 43 | def test_external_locations(): |
@@ -812,6 +813,7 @@ def test_azure_service_principal_info_crawl(mocker): |
812 | 813 | ), |
813 | 814 | ] |
814 | 815 | ws.pipelines.get().spec.configuration = config_dict |
| 816 | + ws.secrets.get_secret.return_value = GetSecretResponse(key="username", value=_SECRET_VALUE) |
815 | 817 | ws.cluster_policies.get().policy_family_definition_overrides = None |
816 | 818 | ws.jobs.list.return_value = sample_jobs |
817 | 819 | spn_crawler = AzureServicePrincipalCrawler(ws, MockBackend(), "ucx")._crawl() |
@@ -1440,6 +1442,7 @@ def test_list_all_cluster_with_spn_in_spark_conf_with_secret(mocker): |
1440 | 1442 |
|
1441 | 1443 | ws = mocker.Mock() |
1442 | 1444 | ws.clusters.list.return_value = sample_clusters |
| 1445 | + ws.secrets.get_secret.return_value = GetSecretResponse(key="username", value=_SECRET_VALUE) |
1443 | 1446 | ws.cluster_policies.get().policy_family_definition_overrides = None |
1444 | 1447 | crawler = AzureServicePrincipalCrawler(ws, MockBackend(), "ucx")._list_all_cluster_with_spn_in_spark_conf() |
1445 | 1448 | result_set = list(crawler) |
@@ -1536,6 +1539,7 @@ def test_list_all_wh_config_with_spn_and_secret(mocker): |
1536 | 1539 | ), |
1537 | 1540 | ] |
1538 | 1541 | mocker.Mock().secrets.get_secret() |
| 1542 | + ws.secrets.get_secret.return_value = GetSecretResponse(key="username", value=_SECRET_VALUE) |
1539 | 1543 | result_set = AzureServicePrincipalCrawler(ws, MockBackend(), "ucx")._list_all_spn_in_sql_warehouses_spark_conf() |
1540 | 1544 |
|
1541 | 1545 | assert len(result_set) == 2 |
@@ -1567,6 +1571,7 @@ def test_list_all_clusters_spn_in_spark_conf_with_tenant(mocker): |
1567 | 1571 | ws = mocker.Mock() |
1568 | 1572 | ws.clusters.list.return_value = sample_clusters |
1569 | 1573 | ws.cluster_policies.get().policy_family_definition_overrides = None |
| 1574 | + ws.secrets.get_secret.return_value = GetSecretResponse(key="username", value=_SECRET_VALUE) |
1570 | 1575 | result_set = AzureServicePrincipalCrawler(ws, MockBackend(), "ucx")._list_all_cluster_with_spn_in_spark_conf() |
1571 | 1576 |
|
1572 | 1577 | assert len(result_set) == 1 |
@@ -1701,6 +1706,7 @@ def test_azure_service_principal_info_policy_conf(mocker): |
1701 | 1706 | value="https://login.microsoftonline.com/dummy_tenant_id2/oauth2/token", |
1702 | 1707 | ), |
1703 | 1708 | ] |
| 1709 | + ws.secrets.get_secret.return_value = GetSecretResponse(key="username", value=_SECRET_VALUE) |
1704 | 1710 | spn_crawler = AzureServicePrincipalCrawler(ws, MockBackend(), "ucx")._crawl() |
1705 | 1711 |
|
1706 | 1712 | assert len(spn_crawler) == 4 |
@@ -1777,6 +1783,7 @@ def test_azure_service_principal_info_dedupe(mocker): |
1777 | 1783 | config_dict = {} |
1778 | 1784 | ws.pipelines.get().spec.configuration = config_dict |
1779 | 1785 | ws.jobs.list.return_value = sample_jobs |
| 1786 | + ws.secrets.get_secret.return_value = GetSecretResponse(key="username", value=_SECRET_VALUE) |
1780 | 1787 | ws.cluster_policies.get().definition = json.dumps( |
1781 | 1788 | { |
1782 | 1789 | "spark_conf.fs.azure.account.auth.type": {"type": "fixed", "value": "OAuth", "hidden": "true"}, |
@@ -1926,6 +1933,7 @@ def test_list_all_pipeline_with_conf_spn_secret(mocker): |
1926 | 1933 | "spark.hadoop.fs.azure.sas.fixed.token.abcde.dfs.core.windows.net": "{{secrets/abcde_access/sasFixedToken}}", |
1927 | 1934 | } |
1928 | 1935 | ws.pipelines.get().spec.configuration = config_dict |
| 1936 | + ws.secrets.get_secret.return_value = GetSecretResponse(key="username", value=_SECRET_VALUE) |
1929 | 1937 | result_set = AzureServicePrincipalCrawler(ws, MockBackend(), "ucx")._list_all_pipeline_with_spn_in_spark_conf() |
1930 | 1938 |
|
1931 | 1939 | assert len(result_set) == 1 |
@@ -2499,10 +2507,10 @@ def test_list_all_pipeline_with_conf_spn_secret_avlb(mocker): |
2499 | 2507 | "spark.hadoop.fs.azure.sas.fixed.token.abcde.dfs.core.windows.net": "{{secrets/abcde_access/sasFixedToken}}", |
2500 | 2508 | } |
2501 | 2509 | ws.pipelines.get().spec.configuration = config_dict |
2502 | | - ws.secrets.get_secret.return_value = GetSecretResponse(key="username", value="dmlkeWEuYXNob2s=") |
| 2510 | + ws.secrets.get_secret.return_value = GetSecretResponse(key="username", value=_SECRET_VALUE) |
2503 | 2511 | result_set = AzureServicePrincipalCrawler(ws, MockBackend(), "ucx")._list_all_pipeline_with_spn_in_spark_conf() |
2504 | 2512 |
|
2505 | 2513 | assert len(result_set) > 0 |
2506 | | - assert result_set[0].get("application_id") == "dmlkeWEuYXNob2s=" |
| 2514 | + assert result_set[0].get("application_id") == "Hello, World!" |
2507 | 2515 | assert result_set[0].get("tenant_id") == "directory_12345" |
2508 | 2516 | assert result_set[0].get("storage_account") == "newstorageacct" |
0 commit comments