|
9 | 9 | from sqlglot import parse_one |
10 | 10 |
|
11 | 11 | from sqlmesh.core.engine_adapter import RedshiftEngineAdapter |
12 | | -from sqlmesh.core.engine_adapter.shared import DataObject |
| 12 | +from sqlmesh.core.engine_adapter.shared import DataObject, DataObjectType |
13 | 13 | from sqlmesh.utils.errors import SQLMeshError |
14 | 14 | from tests.core.engine_adapter import to_sql_calls |
15 | 15 |
|
@@ -83,6 +83,156 @@ def test_varchar_size_workaround(make_mocked_engine_adapter: t.Callable, mocker: |
83 | 83 | ] |
84 | 84 |
|
85 | 85 |
|
| 86 | +def test_sync_grants_config(make_mocked_engine_adapter: t.Callable, mocker: MockerFixture): |
| 87 | + adapter = make_mocked_engine_adapter(RedshiftEngineAdapter) |
| 88 | + relation = exp.to_table("test_schema.test_table", dialect="redshift") |
| 89 | + new_grants_config = {"SELECT": ["user1", "user2"], "INSERT": ["user3"]} |
| 90 | + |
| 91 | + current_grants = [("SELECT", "old_user"), ("UPDATE", "legacy_user")] |
| 92 | + fetchall_mock = mocker.patch.object(adapter, "fetchall", return_value=current_grants) |
| 93 | + |
| 94 | + adapter.sync_grants_config(relation, new_grants_config) |
| 95 | + |
| 96 | + fetchall_mock.assert_called_once() |
| 97 | + executed_query = fetchall_mock.call_args[0][0] |
| 98 | + executed_sql = executed_query.sql(dialect="redshift") |
| 99 | + expected_sql = ( |
| 100 | + "SELECT privilege_type, grantee FROM information_schema.table_privileges " |
| 101 | + "WHERE table_schema = 'test_schema' AND table_name = 'test_table' " |
| 102 | + "AND grantor = CURRENT_USER AND grantee <> CURRENT_USER" |
| 103 | + ) |
| 104 | + assert executed_sql == expected_sql |
| 105 | + |
| 106 | + sql_calls = to_sql_calls(adapter) |
| 107 | + assert len(sql_calls) == 4 |
| 108 | + assert 'REVOKE SELECT ON TABLE "test_schema"."test_table" FROM old_user' in sql_calls |
| 109 | + assert 'REVOKE UPDATE ON TABLE "test_schema"."test_table" FROM legacy_user' in sql_calls |
| 110 | + assert 'GRANT SELECT ON TABLE "test_schema"."test_table" TO user1, user2' in sql_calls |
| 111 | + assert 'GRANT INSERT ON TABLE "test_schema"."test_table" TO user3' in sql_calls |
| 112 | + |
| 113 | + |
| 114 | +def test_sync_grants_config_with_overlaps( |
| 115 | + make_mocked_engine_adapter: t.Callable, mocker: MockerFixture |
| 116 | +): |
| 117 | + adapter = make_mocked_engine_adapter(RedshiftEngineAdapter) |
| 118 | + relation = exp.to_table("test_schema.test_table", dialect="redshift") |
| 119 | + new_grants_config = { |
| 120 | + "SELECT": ["user_shared", "user_new"], |
| 121 | + "INSERT": ["user_shared", "user_writer"], |
| 122 | + } |
| 123 | + |
| 124 | + current_grants = [ |
| 125 | + ("SELECT", "user_shared"), |
| 126 | + ("SELECT", "user_legacy"), |
| 127 | + ("INSERT", "user_shared"), |
| 128 | + ] |
| 129 | + fetchall_mock = mocker.patch.object(adapter, "fetchall", return_value=current_grants) |
| 130 | + |
| 131 | + adapter.sync_grants_config(relation, new_grants_config) |
| 132 | + |
| 133 | + fetchall_mock.assert_called_once() |
| 134 | + executed_query = fetchall_mock.call_args[0][0] |
| 135 | + executed_sql = executed_query.sql(dialect="redshift") |
| 136 | + expected_sql = ( |
| 137 | + "SELECT privilege_type, grantee FROM information_schema.table_privileges " |
| 138 | + "WHERE table_schema = 'test_schema' AND table_name = 'test_table' " |
| 139 | + "AND grantor = CURRENT_USER AND grantee <> CURRENT_USER" |
| 140 | + ) |
| 141 | + assert executed_sql == expected_sql |
| 142 | + |
| 143 | + sql_calls = to_sql_calls(adapter) |
| 144 | + assert len(sql_calls) == 3 |
| 145 | + assert 'REVOKE SELECT ON TABLE "test_schema"."test_table" FROM user_legacy' in sql_calls |
| 146 | + assert 'GRANT SELECT ON TABLE "test_schema"."test_table" TO user_new' in sql_calls |
| 147 | + assert 'GRANT INSERT ON TABLE "test_schema"."test_table" TO user_writer' in sql_calls |
| 148 | + |
| 149 | + |
| 150 | +@pytest.mark.parametrize( |
| 151 | + "table_type, expected_keyword", |
| 152 | + [ |
| 153 | + (DataObjectType.TABLE, "TABLE"), |
| 154 | + (DataObjectType.VIEW, "VIEW"), |
| 155 | + (DataObjectType.MATERIALIZED_VIEW, "MATERIALIZED VIEW"), |
| 156 | + ], |
| 157 | +) |
| 158 | +def test_sync_grants_config_object_kind( |
| 159 | + make_mocked_engine_adapter: t.Callable, |
| 160 | + mocker: MockerFixture, |
| 161 | + table_type: DataObjectType, |
| 162 | + expected_keyword: str, |
| 163 | +) -> None: |
| 164 | + adapter = make_mocked_engine_adapter(RedshiftEngineAdapter) |
| 165 | + relation = exp.to_table("test_schema.test_object", dialect="redshift") |
| 166 | + |
| 167 | + mocker.patch.object(adapter, "fetchall", return_value=[]) |
| 168 | + |
| 169 | + adapter.sync_grants_config(relation, {"SELECT": ["user_test"]}, table_type) |
| 170 | + |
| 171 | + sql_calls = to_sql_calls(adapter) |
| 172 | + assert sql_calls == [ |
| 173 | + f'GRANT SELECT ON {expected_keyword} "test_schema"."test_object" TO user_test' |
| 174 | + ] |
| 175 | + |
| 176 | + |
| 177 | +def test_sync_grants_config_quotes(make_mocked_engine_adapter: t.Callable, mocker: MockerFixture): |
| 178 | + adapter = make_mocked_engine_adapter(RedshiftEngineAdapter) |
| 179 | + relation = exp.to_table('"TestSchema"."TestTable"', dialect="redshift") |
| 180 | + new_grants_config = {"SELECT": ["user1", "user2"], "INSERT": ["user3"]} |
| 181 | + |
| 182 | + current_grants = [("SELECT", "user_old"), ("UPDATE", "user_legacy")] |
| 183 | + fetchall_mock = mocker.patch.object(adapter, "fetchall", return_value=current_grants) |
| 184 | + |
| 185 | + adapter.sync_grants_config(relation, new_grants_config) |
| 186 | + |
| 187 | + fetchall_mock.assert_called_once() |
| 188 | + executed_query = fetchall_mock.call_args[0][0] |
| 189 | + executed_sql = executed_query.sql(dialect="redshift") |
| 190 | + expected_sql = ( |
| 191 | + "SELECT privilege_type, grantee FROM information_schema.table_privileges " |
| 192 | + "WHERE table_schema = 'TestSchema' AND table_name = 'TestTable' " |
| 193 | + "AND grantor = CURRENT_USER AND grantee <> CURRENT_USER" |
| 194 | + ) |
| 195 | + assert executed_sql == expected_sql |
| 196 | + |
| 197 | + sql_calls = to_sql_calls(adapter) |
| 198 | + assert len(sql_calls) == 4 |
| 199 | + assert 'REVOKE SELECT ON TABLE "TestSchema"."TestTable" FROM user_old' in sql_calls |
| 200 | + assert 'REVOKE UPDATE ON TABLE "TestSchema"."TestTable" FROM user_legacy' in sql_calls |
| 201 | + assert 'GRANT SELECT ON TABLE "TestSchema"."TestTable" TO user1, user2' in sql_calls |
| 202 | + assert 'GRANT INSERT ON TABLE "TestSchema"."TestTable" TO user3' in sql_calls |
| 203 | + |
| 204 | + |
| 205 | +def test_sync_grants_config_no_schema( |
| 206 | + make_mocked_engine_adapter: t.Callable, mocker: MockerFixture |
| 207 | +): |
| 208 | + adapter = make_mocked_engine_adapter(RedshiftEngineAdapter) |
| 209 | + relation = exp.to_table("test_table", dialect="redshift") |
| 210 | + new_grants_config = {"SELECT": ["user1"], "INSERT": ["user2"]} |
| 211 | + |
| 212 | + current_grants = [("UPDATE", "user_old")] |
| 213 | + fetchall_mock = mocker.patch.object(adapter, "fetchall", return_value=current_grants) |
| 214 | + get_schema_mock = mocker.patch.object(adapter, "get_current_schema", return_value="public") |
| 215 | + |
| 216 | + adapter.sync_grants_config(relation, new_grants_config) |
| 217 | + |
| 218 | + get_schema_mock.assert_called_once() |
| 219 | + |
| 220 | + executed_query = fetchall_mock.call_args[0][0] |
| 221 | + executed_sql = executed_query.sql(dialect="redshift") |
| 222 | + expected_sql = ( |
| 223 | + "SELECT privilege_type, grantee FROM information_schema.table_privileges " |
| 224 | + "WHERE table_schema = 'public' AND table_name = 'test_table' " |
| 225 | + "AND grantor = CURRENT_USER AND grantee <> CURRENT_USER" |
| 226 | + ) |
| 227 | + assert executed_sql == expected_sql |
| 228 | + |
| 229 | + sql_calls = to_sql_calls(adapter) |
| 230 | + assert len(sql_calls) == 3 |
| 231 | + assert 'REVOKE UPDATE ON TABLE "test_table" FROM user_old' in sql_calls |
| 232 | + assert 'GRANT SELECT ON TABLE "test_table" TO user1' in sql_calls |
| 233 | + assert 'GRANT INSERT ON TABLE "test_table" TO user2' in sql_calls |
| 234 | + |
| 235 | + |
86 | 236 | def test_create_table_from_query_exists_no_if_not_exists( |
87 | 237 | adapter: t.Callable, mocker: MockerFixture |
88 | 238 | ): |
|
0 commit comments