| 
									
										
										
										
											2025-04-03 10:39:47 +05:30
										 |  |  | #  Copyright 2025 Collate | 
					
						
							|  |  |  | #  Licensed under the Collate Community License, Version 1.0 (the "License"); | 
					
						
							| 
									
										
										
										
											2023-03-28 06:29:13 +02:00
										 |  |  | #  you may not use this file except in compliance with the License. | 
					
						
							|  |  |  | #  You may obtain a copy of the License at | 
					
						
							| 
									
										
										
										
											2025-04-03 10:39:47 +05:30
										 |  |  | #  https://github.com/open-metadata/OpenMetadata/blob/main/ingestion/LICENSE | 
					
						
							| 
									
										
										
										
											2023-03-28 06:29:13 +02:00
										 |  |  | #  Unless required by applicable law or agreed to in writing, software | 
					
						
							|  |  |  | #  distributed under the License is distributed on an "AS IS" BASIS, | 
					
						
							|  |  |  | #  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | 
					
						
							|  |  |  | #  See the License for the specific language governing permissions and | 
					
						
							|  |  |  | #  limitations under the License. | 
					
						
							|  |  |  | """
 | 
					
						
							|  |  |  | Test the connection against a source system | 
					
						
							|  |  |  | """
 | 
					
						
							|  |  |  | import traceback | 
					
						
							|  |  |  | from typing import Callable | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-18 11:21:06 +02:00
										 |  |  | from flask import Blueprint, Response, escape, request | 
					
						
							| 
									
										
										
										
											2023-03-28 06:29:13 +02:00
										 |  |  | from openmetadata_managed_apis.api.response import ApiResponse | 
					
						
							|  |  |  | from openmetadata_managed_apis.utils.logger import routes_logger | 
					
						
							|  |  |  | from pydantic import ValidationError | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2025-02-25 18:41:08 +05:30
										 |  |  | from metadata.automations.execute_runner import execute | 
					
						
							| 
									
										
										
										
											2023-12-22 09:56:39 +05:30
										 |  |  | from metadata.ingestion.api.parser import parse_automation_workflow_gracefully | 
					
						
							| 
									
										
										
										
											2023-03-28 06:29:13 +02:00
										 |  |  | from metadata.utils.secrets.secrets_manager_factory import SecretsManagerFactory | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | logger = routes_logger() | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  | def get_fn(blueprint: Blueprint) -> Callable: | 
					
						
							|  |  |  |     """
 | 
					
						
							|  |  |  |     Return the function loaded to a route | 
					
						
							|  |  |  |     :param blueprint: Flask Blueprint to assign route to | 
					
						
							|  |  |  |     :return: routed function | 
					
						
							|  |  |  |     """
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     # Lazy import the requirements | 
					
						
							|  |  |  |     # pylint: disable=import-outside-toplevel | 
					
						
							|  |  |  |     from airflow.api_connexion import security | 
					
						
							|  |  |  |     from airflow.security import permissions | 
					
						
							|  |  |  |     from airflow.www.app import csrf | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     @blueprint.route("/run_automation", methods=["POST"]) | 
					
						
							|  |  |  |     @csrf.exempt | 
					
						
							|  |  |  |     @security.requires_access([(permissions.ACTION_CAN_READ, permissions.RESOURCE_DAG)]) | 
					
						
							|  |  |  |     def run_automation() -> Response: | 
					
						
							|  |  |  |         """
 | 
					
						
							|  |  |  |         Given a WorkflowSource Schema, create the engine | 
					
						
							|  |  |  |         and test the connection | 
					
						
							|  |  |  |         """
 | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         json_request = request.get_json(cache=False) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         try: | 
					
						
							| 
									
										
										
										
											2023-12-22 09:56:39 +05:30
										 |  |  |             automation_workflow = parse_automation_workflow_gracefully( | 
					
						
							|  |  |  |                 config_dict=json_request | 
					
						
							| 
									
										
										
										
											2023-03-28 06:29:13 +02:00
										 |  |  |             ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2023-05-08 09:54:31 +02:00
										 |  |  |             # we need to instantiate the secret manager in case secrets are passed | 
					
						
							|  |  |  |             SecretsManagerFactory( | 
					
						
							|  |  |  |                 automation_workflow.openMetadataServerConnection.secretsManagerProvider, | 
					
						
							| 
									
										
										
										
											2023-05-19 09:43:11 +02:00
										 |  |  |                 automation_workflow.openMetadataServerConnection.secretsManagerLoader, | 
					
						
							| 
									
										
										
										
											2023-05-08 09:54:31 +02:00
										 |  |  |             ) | 
					
						
							|  |  |  | 
 | 
					
						
							| 
									
										
										
										
											2024-01-28 19:25:15 +01:00
										 |  |  |             # Should this be triggered async? | 
					
						
							| 
									
										
										
										
											2023-03-28 06:29:13 +02:00
										 |  |  |             execute(automation_workflow) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |             return ApiResponse.success( | 
					
						
							|  |  |  |                 { | 
					
						
							| 
									
										
										
										
											2023-05-18 11:21:06 +02:00
										 |  |  |                     "message": f"Workflow [{escape(automation_workflow.name)}] has been triggered." | 
					
						
							| 
									
										
										
										
											2023-03-28 06:29:13 +02:00
										 |  |  |                 } | 
					
						
							|  |  |  |             ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         except ValidationError as err: | 
					
						
							|  |  |  |             msg = f"Request Validation Error parsing payload: {err}" | 
					
						
							|  |  |  |             logger.debug(traceback.format_exc()) | 
					
						
							|  |  |  |             logger.error(msg) | 
					
						
							|  |  |  |             return ApiResponse.error( | 
					
						
							|  |  |  |                 status=ApiResponse.STATUS_BAD_REQUEST, | 
					
						
							|  |  |  |                 error=msg, | 
					
						
							|  |  |  |             ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |         except Exception as exc: | 
					
						
							|  |  |  |             msg = f"Error running automation workflow due to [{exc}] " | 
					
						
							|  |  |  |             logger.debug(traceback.format_exc()) | 
					
						
							|  |  |  |             logger.error(msg) | 
					
						
							|  |  |  |             return ApiResponse.error( | 
					
						
							|  |  |  |                 status=ApiResponse.STATUS_SERVER_ERROR, | 
					
						
							|  |  |  |                 error=msg, | 
					
						
							|  |  |  |             ) | 
					
						
							|  |  |  | 
 | 
					
						
							|  |  |  |     return run_automation |