mirror of
https://github.com/open-metadata/OpenMetadata.git
synced 2025-07-06 08:37:22 +00:00
68 lines
3.1 KiB
Python
68 lines
3.1 KiB
Python
# Copyright 2025 Collate
|
|
# Licensed under the Collate Community License, Version 1.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
# https://github.com/open-metadata/OpenMetadata/blob/main/ingestion/LICENSE
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
"""
|
|
Test run automations
|
|
"""
|
|
from metadata.generated.schema.entity.teams.user import User
|
|
from metadata.ingestion.api.parser import parse_automation_workflow_gracefully
|
|
from metadata.ingestion.ometa.ometa_api import OpenMetadata
|
|
from metadata.utils.secrets.secrets_manager_factory import SecretsManagerFactory
|
|
|
|
JSON_REQUEST = {
|
|
"id": "6192f18e-5f0c-42e3-8568-0c3ce6e07ac5",
|
|
"name": "test-connection-Mysql-Prmeqo2t",
|
|
"fullyQualifiedName": "test-connection-Mysql-Prmeqo2t",
|
|
"workflowType": "TEST_CONNECTION",
|
|
"request": {
|
|
"connection": {
|
|
"config": {
|
|
"type": "Mysql",
|
|
"scheme": "mysql+pymysql",
|
|
"authType": {"password": "fernet:xyz"},
|
|
"hostPort": "mysql:3306",
|
|
"username": "openmetadata_user",
|
|
"databaseSchema": "openmetadata_db",
|
|
}
|
|
},
|
|
"serviceName": "mysql",
|
|
"serviceType": "Database",
|
|
"connectionType": "Mysql",
|
|
},
|
|
"openMetadataServerConnection": {
|
|
"clusterName": "openmetadata",
|
|
"type": "OpenMetadata",
|
|
"hostPort": "http://localhost:8585/api",
|
|
"authProvider": "openmetadata",
|
|
"securityConfig": {
|
|
"jwtToken": "eyJraWQiOiJHYjM4OWEtOWY3Ni1nZGpzLWE5MmotMDI0MmJrOTQzNTYiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJzdWIiOiJhZG1pbiIsImlzQm90IjpmYWxzZSwiaXNzIjoib3Blbi1tZXRhZGF0YS5vcmciLCJpYXQiOjE2NjM5Mzg0NjIsImVtYWlsIjoiYWRtaW5Ab3Blbm1ldGFkYXRhLm9yZyJ9.tS8um_5DKu7HgzGBzS1VTA5uUjKWOCU0B_j08WXBiEC0mr0zNREkqVfwFDD-d24HlNEbrqioLsBuFRiwIWKc1m_ZlVQbG7P36RUxhuv2vbSp80FKyNM-Tj93FDzq91jsyNmsQhyNv_fNr3TXfzzSPjHt8Go0FMMP66weoKMgW2PbXlhVKwEuXUHyakLLzewm9UMeQaEiRzhiTMU3UkLXcKbYEJJvfNFcLwSl9W8JCO_l0Yj3ud-qt_nQYEZwqW6u5nfdQllN133iikV4fM5QZsMCnm8Rq1mvLR0y9bmJiD7fwM1tmJ791TUWqmKaTnP49U493VanKpUAfzIiOiIbhg"
|
|
},
|
|
},
|
|
}
|
|
|
|
|
|
def test_run_automation():
|
|
"""Follow the flow in run_automation and validate we're getting the right JWT"""
|
|
|
|
automation_workflow = parse_automation_workflow_gracefully(config_dict=JSON_REQUEST)
|
|
|
|
# we need to instantiate the secret manager in case secrets are passed
|
|
SecretsManagerFactory(
|
|
automation_workflow.openMetadataServerConnection.secretsManagerProvider,
|
|
automation_workflow.openMetadataServerConnection.secretsManagerLoader,
|
|
)
|
|
|
|
metadata = OpenMetadata(config=automation_workflow.openMetadataServerConnection)
|
|
|
|
# Check the token is valid
|
|
admin: User = metadata.get_by_name(entity=User, fqn="admin")
|
|
assert admin
|