mirror of
https://github.com/ansible-collections/community.mysql.git
synced 2025-04-06 10:40:36 -07:00
* mysql_role: new module
* fixes
* fixes
* Add the role class
* Check if role exists
* role.add()
* role.__get_members
* tmp
* tmp
* Change tests
* Fix
* Fix
* add_members()
* get_privs()
* tmp
* __extract_grants() filler version
* Before big work
* tmp
* drop()
* tmp
* tmp
* Big changes
* Fix
* append_members, detach_members, append_privs
* tmp
* admin option
* Add tests
* Add tests
* Fix tests
* Remove debug warning
* Fix tests
* Add documentation
* Fix MariaDB case
* Fix MariaDB
* Fix MariaDB
* Fix MariaDB
* Fix MariaDB
* Fix MariaDB
* Fix
* Fix
* Remove debug warning
* Add try-except block
* tmp
* tmp
* tmp
* Fix
* Add err handling
* Add user check
* Check admin in db
* Fix CI
* Fix CI
* Fix CI
* Fix CI
* Fix
* Add mutually exclusive options
* Small refactoring, documenting
* Documenting, refactoring
* Change docs
* Refactoring
* Refactoring
* Refactoring
* Add unit tests
* Update README.md
(cherry picked from commit ce2b269f84
)
165 lines
6.9 KiB
Python
165 lines
6.9 KiB
Python
# -*- coding: utf-8 -*-
|
|
|
|
from __future__ import (absolute_import, division, print_function)
|
|
__metaclass__ = type
|
|
|
|
import pytest
|
|
try:
|
|
from unittest.mock import MagicMock
|
|
except ImportError:
|
|
from mock import MagicMock
|
|
|
|
from ansible_collections.community.mysql.plugins.module_utils.user import (
|
|
handle_grant_on_col,
|
|
has_grant_on_col,
|
|
normalize_col_grants,
|
|
sort_column_order,
|
|
handle_requiressl_in_priv_string
|
|
)
|
|
from ..utils import dummy_cursor_class
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
'input_list,grant,output_tuple',
|
|
[
|
|
(['INSERT', 'DELETE'], 'INSERT', (None, None)),
|
|
(['SELECT', 'UPDATE'], 'SELECT', (None, None)),
|
|
(['INSERT', 'UPDATE', 'INSERT', 'DELETE'], 'DELETE', (None, None)),
|
|
(['just', 'a', 'random', 'text'], 'blabla', (None, None)),
|
|
(['SELECT (A, B, C)'], 'SELECT', (0, 0)),
|
|
(['UPDATE', 'SELECT (A, B, C)'], 'SELECT', (1, 1)),
|
|
(['UPDATE', 'REFERENCES (A, B, C)'], 'REFERENCES', (1, 1)),
|
|
(['SELECT', 'UPDATE (A, B, C)'], 'UPDATE', (1, 1)),
|
|
(['INSERT', 'SELECT (A', 'B)'], 'SELECT', (1, 2)),
|
|
(['SELECT (A', 'B)', 'UPDATE'], 'SELECT', (0, 1)),
|
|
(['INSERT', 'SELECT (A', 'B)', 'UPDATE'], 'SELECT', (1, 2)),
|
|
(['INSERT (A, B)', 'SELECT (A', 'B)', 'UPDATE'], 'INSERT', (0, 0)),
|
|
(['INSERT (A', 'B)', 'SELECT (A', 'B)', 'UPDATE'], 'INSERT', (0, 1)),
|
|
(['INSERT (A', 'B)', 'SELECT (A', 'B)', 'UPDATE'], 'SELECT', (2, 3)),
|
|
(['INSERT (A', 'B)', 'SELECT (A', 'C', 'B)', 'UPDATE'], 'SELECT', (2, 4)),
|
|
]
|
|
)
|
|
def test_has_grant_on_col(input_list, grant, output_tuple):
|
|
"""Tests has_grant_on_col function."""
|
|
assert has_grant_on_col(input_list, grant) == output_tuple
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
'input_,output',
|
|
[
|
|
('SELECT (A)', 'SELECT (A)'),
|
|
('SELECT (`A`)', 'SELECT (A)'),
|
|
('UPDATE (B, A)', 'UPDATE (A, B)'),
|
|
('INSERT (`A`, `B`)', 'INSERT (A, B)'),
|
|
('REFERENCES (B, A)', 'REFERENCES (A, B)'),
|
|
('SELECT (`B`, `A`)', 'SELECT (A, B)'),
|
|
('SELECT (`B`, `A`, C)', 'SELECT (A, B, C)'),
|
|
]
|
|
)
|
|
def test_sort_column_order(input_, output):
|
|
"""Tests sort_column_order function."""
|
|
assert sort_column_order(input_) == output
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
'privileges,start,end,output',
|
|
[
|
|
(['UPDATE', 'SELECT (C, B, A)'], 1, 1, ['UPDATE', 'SELECT (A, B, C)']),
|
|
(['INSERT', 'SELECT (A', 'B)'], 1, 2, ['INSERT', 'SELECT (A, B)']),
|
|
(
|
|
['SELECT (`A`', 'B)', 'UPDATE', 'REFERENCES (B, A)'], 0, 1,
|
|
['SELECT (A, B)', 'UPDATE', 'REFERENCES (B, A)']),
|
|
(
|
|
['INSERT', 'REFERENCES (`B`', 'A', 'C)', 'UPDATE (A', 'B)'], 1, 3,
|
|
['INSERT', 'REFERENCES (A, B, C)', 'UPDATE (A', 'B)']),
|
|
]
|
|
)
|
|
def test_handle_grant_on_col(privileges, start, end, output):
|
|
"""Tests handle_grant_on_col function."""
|
|
assert handle_grant_on_col(privileges, start, end) == output
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
'input_tuple,output_tuple',
|
|
[
|
|
(('*.*:REQUIRESSL', None), (None, 'SSL')),
|
|
(('*.*:ALL,REQUIRESSL', None), ('*.*:ALL', 'SSL')),
|
|
(('*.*:REQUIRESSL,ALL', None), ('*.*:ALL', 'SSL')),
|
|
(('*.*:ALL,REQUIRESSL,GRANT', None), ('*.*:ALL,GRANT', 'SSL')),
|
|
(('*.*:ALL,REQUIRESSL,GRANT/a.b:USAGE', None), ('*.*:ALL,GRANT/a.b:USAGE', 'SSL')),
|
|
(('*.*:REQUIRESSL', 'X509'), (None, 'X509')),
|
|
(('*.*:ALL,REQUIRESSL', 'X509'), ('*.*:ALL', 'X509')),
|
|
(('*.*:REQUIRESSL,ALL', 'X509'), ('*.*:ALL', 'X509')),
|
|
(('*.*:ALL,REQUIRESSL,GRANT', 'X509'), ('*.*:ALL,GRANT', 'X509')),
|
|
(('*.*:ALL,REQUIRESSL,GRANT/a.b:USAGE', 'X509'), ('*.*:ALL,GRANT/a.b:USAGE', 'X509')),
|
|
(('*.*:REQUIRESSL', {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
}), (None, {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
})),
|
|
(('*.*:ALL,REQUIRESSL', {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
}), ('*.*:ALL', {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
})),
|
|
(('*.*:REQUIRESSL,ALL', {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
}), ('*.*:ALL', {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
})),
|
|
(('*.*:ALL,REQUIRESSL,GRANT', {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
}), ('*.*:ALL,GRANT', {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
})),
|
|
(('*.*:ALL,REQUIRESSL,GRANT/a.b:USAGE', {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
}), ('*.*:ALL,GRANT/a.b:USAGE', {
|
|
'subject': '/CN=alice/O=MyDom, Inc./C=US/ST=Oregon/L=Portland',
|
|
'cipher': 'ECDHE-ECDSA-AES256-SHA384',
|
|
'issuer': '/CN=org/O=MyDom, Inc./C=US/ST=Oregon/L=Portland'
|
|
}))
|
|
]
|
|
)
|
|
def test_handle_requiressl_in_priv_string(input_tuple, output_tuple):
|
|
"""Tests the handle_requiressl_in_priv_string funciton."""
|
|
assert handle_requiressl_in_priv_string(MagicMock(), *input_tuple) == output_tuple
|
|
|
|
|
|
@pytest.mark.parametrize(
|
|
'input_,expected',
|
|
[
|
|
(['SELECT'], ['SELECT']),
|
|
(['SELECT (A, B)'], ['SELECT (A, B)']),
|
|
(['SELECT (B, A)'], ['SELECT (A, B)']),
|
|
(['UPDATE', 'SELECT (C, B, A)'], ['UPDATE', 'SELECT (A, B, C)']),
|
|
(['INSERT', 'SELECT (A', 'B)'], ['INSERT', 'SELECT (A, B)']),
|
|
(
|
|
['SELECT (`A`', 'B)', 'UPDATE', 'REFERENCES (B, A)'],
|
|
['SELECT (A, B)', 'UPDATE', 'REFERENCES (A, B)']),
|
|
(
|
|
['INSERT', 'REFERENCES (`B`', 'A', 'C)', 'UPDATE (B', 'A)', 'DELETE'],
|
|
['INSERT', 'REFERENCES (A, B, C)', 'UPDATE (A, B)', 'DELETE']),
|
|
]
|
|
)
|
|
def test_normalize_col_grants(input_, expected):
|
|
"""Tests normalize_col_grants function."""
|
|
assert normalize_col_grants(input_) == expected
|