mirror of
				https://github.com/open-metadata/OpenMetadata.git
				synced 2025-10-31 02:29:03 +00:00 
			
		
		
		
	 a677910982
			
		
	
	
		a677910982
		
			
		
	
	
	
	
		
			
			* Fix #16211: Fix special charechter encoding in trino username * fix test and add comments
		
			
				
	
	
		
			1181 lines
		
	
	
		
			43 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			1181 lines
		
	
	
		
			43 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
| #  Copyright 2021 Collate
 | |
| #  Licensed under the Apache License, Version 2.0 (the "License");
 | |
| #  you may not use this file except in compliance with the License.
 | |
| #  You may obtain a copy of the License at
 | |
| #  http://www.apache.org/licenses/LICENSE-2.0
 | |
| #  Unless required by applicable law or agreed to in writing, software
 | |
| #  distributed under the License is distributed on an "AS IS" BASIS,
 | |
| #  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| #  See the License for the specific language governing permissions and
 | |
| #  limitations under the License.
 | |
| 
 | |
| from unittest import TestCase
 | |
| 
 | |
| from metadata.generated.schema.entity.services.connections.database.athenaConnection import (
 | |
|     AthenaConnection,
 | |
|     AthenaScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.clickhouseConnection import (
 | |
|     ClickhouseConnection,
 | |
|     ClickhouseScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.common.basicAuth import (
 | |
|     BasicAuth,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.common.jwtAuth import (
 | |
|     JwtAuth,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.databricksConnection import (
 | |
|     DatabricksConnection,
 | |
|     DatabricksScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.db2Connection import (
 | |
|     Db2Connection,
 | |
|     Db2Scheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.druidConnection import (
 | |
|     DruidConnection,
 | |
|     DruidScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.hiveConnection import (
 | |
|     HiveConnection,
 | |
|     HiveScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.impalaConnection import (
 | |
|     ImpalaConnection,
 | |
|     ImpalaScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.mariaDBConnection import (
 | |
|     MariaDBConnection,
 | |
|     MariaDBScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.mssqlConnection import (
 | |
|     MssqlConnection,
 | |
|     MssqlScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.mysqlConnection import (
 | |
|     MysqlConnection,
 | |
|     MySQLScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.oracleConnection import (
 | |
|     OracleConnection,
 | |
|     OracleDatabaseSchema,
 | |
|     OracleScheme,
 | |
|     OracleServiceName,
 | |
|     OracleTNSConnection,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.pinotDBConnection import (
 | |
|     PinotDBConnection,
 | |
|     PinotDBScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.postgresConnection import (
 | |
|     PostgresConnection,
 | |
|     PostgresScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.prestoConnection import (
 | |
|     PrestoConnection,
 | |
|     PrestoScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.redshiftConnection import (
 | |
|     RedshiftConnection,
 | |
|     RedshiftScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.singleStoreConnection import (
 | |
|     SingleStoreConnection,
 | |
|     SingleStoreScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.snowflakeConnection import (
 | |
|     SnowflakeConnection,
 | |
|     SnowflakeScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.trinoConnection import (
 | |
|     TrinoConnection,
 | |
|     TrinoScheme,
 | |
| )
 | |
| from metadata.generated.schema.entity.services.connections.database.verticaConnection import (
 | |
|     VerticaConnection,
 | |
|     VerticaScheme,
 | |
| )
 | |
| from metadata.generated.schema.security.credentials import awsCredentials
 | |
| from metadata.ingestion.connections.builders import (
 | |
|     get_connection_args_common,
 | |
|     get_connection_url_common,
 | |
| )
 | |
| 
 | |
| 
 | |
| # pylint: disable=import-outside-toplevel
 | |
| class SourceConnectionTest(TestCase):
 | |
|     def test_databricks_url_without_db(self):
 | |
|         from metadata.ingestion.source.database.databricks.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = (
 | |
|             "databricks+connector://token:KlivDTACWXKmZVfN1qIM@1.1.1.1:443"
 | |
|         )
 | |
|         databricks_conn_obj = DatabricksConnection(
 | |
|             scheme=DatabricksScheme.databricks_connector,
 | |
|             hostPort="1.1.1.1:443",
 | |
|             token="KlivDTACWXKmZVfN1qIM",
 | |
|         )
 | |
|         assert expected_result == get_connection_url(databricks_conn_obj)
 | |
| 
 | |
|     def test_databricks_url_with_db(self):
 | |
|         from metadata.ingestion.source.database.databricks.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = (
 | |
|             "databricks+connector://token:KlivDTACWXKmZVfN1qIM@1.1.1.1:443"
 | |
|         )
 | |
|         databricks_conn_obj = DatabricksConnection(
 | |
|             scheme=DatabricksScheme.databricks_connector,
 | |
|             hostPort="1.1.1.1:443",
 | |
|             token="KlivDTACWXKmZVfN1qIM",
 | |
|         )
 | |
|         assert expected_result == get_connection_url(databricks_conn_obj)
 | |
| 
 | |
|     def test_hive_url(self):
 | |
|         from metadata.ingestion.source.database.hive.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "hive://localhost:10000"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive, hostPort="localhost:10000"
 | |
|         )
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|         expected_http_result = "hive+http://localhost:1000"
 | |
|         http_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive_http, hostPort="localhost:1000"
 | |
|         )
 | |
| 
 | |
|         assert expected_http_result == get_connection_url(http_conn_obj)
 | |
| 
 | |
|         exptected_https_result = "hive+https://localhost:1000"
 | |
|         http_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive_https, hostPort="localhost:1000"
 | |
|         )
 | |
|         assert exptected_https_result == get_connection_url(http_conn_obj)
 | |
| 
 | |
|     def test_hive_url_custom_auth(self):
 | |
|         from metadata.ingestion.source.database.hive.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "hive://username:password@localhost:10000"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive.value,
 | |
|             username="username",
 | |
|             password="password",
 | |
|             hostPort="localhost:10000",
 | |
|             connectionArguments={"auth": "CUSTOM"},
 | |
|         )
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|         # Passing @ in username and password
 | |
|         expected_result = "hive://username%40444:password%40333@localhost:10000"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive.value,
 | |
|             username="username@444",
 | |
|             password="password@333",
 | |
|             hostPort="localhost:10000",
 | |
|             connectionArguments={"auth": "CUSTOM"},
 | |
|         )
 | |
| 
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|     def test_hive_url_conn_options_with_db(self):
 | |
|         from metadata.ingestion.source.database.hive.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "hive://localhost:10000/test_db?Key=Value"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             hostPort="localhost:10000",
 | |
|             databaseSchema="test_db",
 | |
|             connectionOptions={"Key": "Value"},
 | |
|         )
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|     def test_hive_url_conn_options_without_db(self):
 | |
|         from metadata.ingestion.source.database.hive.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "hive://localhost:10000?Key=Value"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             hostPort="localhost:10000",
 | |
|             connectionOptions={"Key": "Value"},
 | |
|         )
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|     def test_hive_url_with_kerberos_auth(self):
 | |
|         from metadata.ingestion.source.database.hive.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "hive://localhost:10000"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive.value,
 | |
|             hostPort="localhost:10000",
 | |
|             connectionArguments={
 | |
|                 "auth": "KERBEROS",
 | |
|                 "kerberos_service_name": "hive",
 | |
|             },
 | |
|         )
 | |
| 
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|     def test_hive_url_with_ldap_auth(self):
 | |
|         from metadata.ingestion.source.database.hive.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "hive://username:password@localhost:10000"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive.value,
 | |
|             username="username",
 | |
|             password="password",
 | |
|             hostPort="localhost:10000",
 | |
|             connectionArguments={"auth": "LDAP"},
 | |
|         )
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|     def test_hive_url_without_auth(self):
 | |
|         from metadata.ingestion.source.database.hive.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "hive://username:password@localhost:10000"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive.value,
 | |
|             username="username",
 | |
|             password="password",
 | |
|             hostPort="localhost:10000",
 | |
|             connectionArguments={"customKey": "value"},
 | |
|         )
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|     def test_hive_url_without_connection_arguments(self):
 | |
|         from metadata.ingestion.source.database.hive.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "hive://username:password@localhost:10000"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive.value,
 | |
|             username="username",
 | |
|             password="password",
 | |
|             hostPort="localhost:10000",
 | |
|         )
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|     def test_hive_url_without_connection_arguments_pass(self):
 | |
|         from metadata.ingestion.source.database.hive.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "hive://username@localhost:10000"
 | |
|         hive_conn_obj = HiveConnection(
 | |
|             scheme=HiveScheme.hive.value,
 | |
|             username="username",
 | |
|             hostPort="localhost:10000",
 | |
|         )
 | |
|         assert expected_result == get_connection_url(hive_conn_obj)
 | |
| 
 | |
|     def test_impala_url(self):
 | |
|         from metadata.ingestion.source.database.impala.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "impala://localhost:21050"
 | |
|         impala_conn_obj = ImpalaConnection(
 | |
|             scheme=ImpalaScheme.impala, hostPort="localhost:21050"
 | |
|         )
 | |
|         assert expected_result == get_connection_url(impala_conn_obj)
 | |
| 
 | |
|     def test_impala_url_custom_auth(self):
 | |
|         from metadata.ingestion.source.database.impala.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "impala://username:password@localhost:21050"
 | |
|         impala_conn_obj = ImpalaConnection(
 | |
|             scheme=ImpalaScheme.impala.value,
 | |
|             username="username",
 | |
|             password="password",
 | |
|             hostPort="localhost:21050",
 | |
|             connectionArguments={"auth": "CUSTOM"},
 | |
|         )
 | |
|         assert expected_result == get_connection_url(impala_conn_obj)
 | |
| 
 | |
|         # Passing @ in username and password
 | |
|         expected_result = "impala://username%40444:password%40333@localhost:21050"
 | |
|         impala_conn_obj = ImpalaConnection(
 | |
|             scheme=ImpalaScheme.impala.value,
 | |
|             username="username@444",
 | |
|             password="password@333",
 | |
|             hostPort="localhost:21050",
 | |
|             connectionArguments={"auth": "CUSTOM"},
 | |
|         )
 | |
| 
 | |
|         assert expected_result == get_connection_url(impala_conn_obj)
 | |
| 
 | |
|     def test_impala_url_conn_options_with_db(self):
 | |
|         from metadata.ingestion.source.database.impala.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "impala://localhost:21050/test_db?Key=Value"
 | |
|         impala_conn_obj = ImpalaConnection(
 | |
|             hostPort="localhost:21050",
 | |
|             databaseSchema="test_db",
 | |
|             connectionOptions={"Key": "Value"},
 | |
|         )
 | |
|         assert expected_result == get_connection_url(impala_conn_obj)
 | |
| 
 | |
|     def test_impala_url_conn_options_without_db(self):
 | |
|         from metadata.ingestion.source.database.impala.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "impala://localhost:21050?Key=Value"
 | |
|         impala_conn_obj = ImpalaConnection(
 | |
|             hostPort="localhost:21050",
 | |
|             connectionOptions={"Key": "Value"},
 | |
|         )
 | |
|         assert expected_result == get_connection_url(impala_conn_obj)
 | |
| 
 | |
|     def test_impala_url_with_ldap_auth(self):
 | |
|         from metadata.ingestion.source.database.impala.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "impala://username:password@localhost:21050"
 | |
|         impala_conn_obj = ImpalaConnection(
 | |
|             scheme=ImpalaScheme.impala.value,
 | |
|             username="username",
 | |
|             password="password",
 | |
|             hostPort="localhost:21050",
 | |
|             connectionArguments={"auth_mechanism": "LDAP"},
 | |
|         )
 | |
|         assert expected_result == get_connection_url(impala_conn_obj)
 | |
| 
 | |
|     def test_impala_url_without_connection_arguments(self):
 | |
|         from metadata.ingestion.source.database.impala.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "impala://username:password@localhost:21050"
 | |
|         impala_conn_obj = ImpalaConnection(
 | |
|             scheme=ImpalaScheme.impala.value,
 | |
|             username="username",
 | |
|             password="password",
 | |
|             hostPort="localhost:21050",
 | |
|         )
 | |
|         assert expected_result == get_connection_url(impala_conn_obj)
 | |
| 
 | |
|     def test_impala_url_without_connection_arguments_pass(self):
 | |
|         from metadata.ingestion.source.database.impala.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_result = "impala://username@localhost:21050"
 | |
|         impala_conn_obj = ImpalaConnection(
 | |
|             scheme=ImpalaScheme.impala.value,
 | |
|             username="username",
 | |
|             hostPort="localhost:21050",
 | |
|         )
 | |
|         assert expected_result == get_connection_url(impala_conn_obj)
 | |
| 
 | |
|     def test_trino_url_without_params(self):
 | |
|         from metadata.ingestion.source.database.trino.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_url = "trino://username:pass@localhost:443/catalog"
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             scheme=TrinoScheme.trino,
 | |
|             hostPort="localhost:443",
 | |
|             username="username",
 | |
|             authType=BasicAuth(password="pass"),
 | |
|             catalog="catalog",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(trino_conn_obj)
 | |
| 
 | |
|         # Passing @ in username and password
 | |
|         expected_url = "trino://username%2540444:pass%40111@localhost:443/catalog"
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             scheme=TrinoScheme.trino,
 | |
|             hostPort="localhost:443",
 | |
|             username="username@444",
 | |
|             authType=BasicAuth(password="pass@111"),
 | |
|             catalog="catalog",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(trino_conn_obj)
 | |
| 
 | |
|     def test_trino_conn_arguments(self):
 | |
|         from metadata.ingestion.source.database.trino.connection import (
 | |
|             get_connection_args,
 | |
|         )
 | |
| 
 | |
|         # connection arguments without connectionArguments and without proxies
 | |
|         expected_args = {}
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             username="user",
 | |
|             authType=BasicAuth(password=None),
 | |
|             hostPort="localhost:443",
 | |
|             catalog="tpcds",
 | |
|             connectionArguments=None,
 | |
|             scheme=TrinoScheme.trino,
 | |
|         )
 | |
|         assert expected_args == get_connection_args(trino_conn_obj)
 | |
| 
 | |
|         # connection arguments with connectionArguments and without proxies
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             username="user",
 | |
|             authType=BasicAuth(password=None),
 | |
|             hostPort="localhost:443",
 | |
|             catalog="tpcds",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             scheme=TrinoScheme.trino,
 | |
|         )
 | |
|         assert expected_args == get_connection_args(trino_conn_obj)
 | |
| 
 | |
|         # connection arguments without connectionArguments and with proxies
 | |
|         expected_args = {}
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             username="user",
 | |
|             authType=BasicAuth(password=None),
 | |
|             hostPort="localhost:443",
 | |
|             catalog="tpcds",
 | |
|             connectionArguments=None,
 | |
|             proxies={"http": "foo.bar:3128", "http://host.name": "foo.bar:4012"},
 | |
|             scheme=TrinoScheme.trino,
 | |
|         )
 | |
|         conn_args = get_connection_args(trino_conn_obj)
 | |
|         assert "http_session" in conn_args
 | |
|         conn_args.pop("http_session")
 | |
|         assert expected_args == conn_args
 | |
| 
 | |
|         # connection arguments with connectionArguments and with proxies
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             username="user",
 | |
|             authType=BasicAuth(password=None),
 | |
|             hostPort="localhost:443",
 | |
|             catalog="tpcds",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             proxies={"http": "foo.bar:3128", "http://host.name": "foo.bar:4012"},
 | |
|             scheme=TrinoScheme.trino,
 | |
|         )
 | |
|         conn_args = get_connection_args(trino_conn_obj)
 | |
|         assert "http_session" in conn_args
 | |
|         conn_args.pop("http_session")
 | |
|         assert expected_args == conn_args
 | |
| 
 | |
|     def test_trino_url_with_params(self):
 | |
|         from metadata.ingestion.source.database.trino.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_url = "trino://username:pass@localhost:443/catalog?param=value"
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             scheme=TrinoScheme.trino,
 | |
|             hostPort="localhost:443",
 | |
|             username="username",
 | |
|             authType=BasicAuth(password="pass"),
 | |
|             catalog="catalog",
 | |
|             connectionOptions={"param": "value"},
 | |
|         )
 | |
|         assert expected_url == get_connection_url(trino_conn_obj)
 | |
| 
 | |
|     def test_trino_url_with_jwt_auth(self):
 | |
|         from metadata.ingestion.source.database.trino.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_url = (
 | |
|             "trino://username@localhost:443/catalog?access_token=jwt_token_value"
 | |
|         )
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             scheme=TrinoScheme.trino,
 | |
|             hostPort="localhost:443",
 | |
|             username="username",
 | |
|             authType=JwtAuth(jwt="jwt_token_value"),
 | |
|             catalog="catalog",
 | |
|         )
 | |
|         assert expected_url == get_connection_url(trino_conn_obj)
 | |
| 
 | |
|     def test_trino_with_proxies(self):
 | |
|         from metadata.ingestion.source.database.trino.connection import (
 | |
|             get_connection_args,
 | |
|         )
 | |
| 
 | |
|         test_proxies = {"http": "http_proxy", "https": "https_proxy"}
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             scheme=TrinoScheme.trino,
 | |
|             hostPort="localhost:443",
 | |
|             username="username",
 | |
|             authType=BasicAuth(password="pass"),
 | |
|             catalog="catalog",
 | |
|             proxies=test_proxies,
 | |
|         )
 | |
|         assert (
 | |
|             test_proxies
 | |
|             == get_connection_args(trino_conn_obj).get("http_session").proxies
 | |
|         )
 | |
| 
 | |
|     def test_trino_without_catalog(self):
 | |
|         from metadata.ingestion.source.database.trino.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         # Test trino url without catalog
 | |
|         expected_url = "trino://username:pass@localhost:443"
 | |
|         trino_conn_obj = TrinoConnection(
 | |
|             scheme=TrinoScheme.trino,
 | |
|             hostPort="localhost:443",
 | |
|             username="username",
 | |
|             authType=BasicAuth(password="pass"),
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(trino_conn_obj)
 | |
| 
 | |
|     def test_vertica_url(self):
 | |
|         expected_url = (
 | |
|             "vertica+vertica_python://username:password@localhost:5443/database"
 | |
|         )
 | |
|         vertica_conn_obj = VerticaConnection(
 | |
|             scheme=VerticaScheme.vertica_vertica_python,
 | |
|             hostPort="localhost:5443",
 | |
|             username="username",
 | |
|             password="password",
 | |
|             database="database",
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(vertica_conn_obj)
 | |
| 
 | |
|         # Passing @ in username and password
 | |
|         expected_url = "vertica+vertica_python://username%40444:password%40123@localhost:5443/database"
 | |
|         vertica_conn_obj = VerticaConnection(
 | |
|             scheme=VerticaScheme.vertica_vertica_python,
 | |
|             hostPort="localhost:5443",
 | |
|             username="username@444",
 | |
|             password="password@123",
 | |
|             database="database",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url_common(vertica_conn_obj)
 | |
| 
 | |
|     def test_druid_url(self):
 | |
|         from metadata.ingestion.source.database.druid.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_url = "druid://localhost:8082/druid/v2/sql"
 | |
|         druid_conn_obj = DruidConnection(
 | |
|             scheme=DruidScheme.druid, hostPort="localhost:8082"
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(druid_conn_obj)
 | |
| 
 | |
|     def test_pinotdb_url(self):
 | |
|         from metadata.ingestion.source.database.pinotdb.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_url = (
 | |
|             "pinot://localhost:8099/query/sql?controller=http://localhost:9000/"
 | |
|         )
 | |
|         pinot_conn_obj = PinotDBConnection(
 | |
|             scheme=PinotDBScheme.pinot,
 | |
|             hostPort="localhost:8099",
 | |
|             pinotControllerHost="http://localhost:9000/",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(pinot_conn_obj)
 | |
| 
 | |
|     def test_mysql_url(self):
 | |
|         # connection arguments without db
 | |
|         expected_url = "mysql+pymysql://openmetadata_user:@localhost:3306"
 | |
|         mysql_conn_obj = MysqlConnection(
 | |
|             username="openmetadata_user",
 | |
|             hostPort="localhost:3306",
 | |
|             scheme=MySQLScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(mysql_conn_obj)
 | |
| 
 | |
|         # connection arguments with db
 | |
|         expected_url = "mysql+pymysql://openmetadata_user:@localhost:3306"
 | |
|         mysql_conn_obj = MysqlConnection(
 | |
|             username="openmetadata_user",
 | |
|             hostPort="localhost:3306",
 | |
|             scheme=MySQLScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(mysql_conn_obj)
 | |
| 
 | |
|     def test_clickhouse_url(self):
 | |
|         # connection arguments without db
 | |
|         expected_url = "clickhouse+http://username:@localhost:8123"
 | |
|         clickhouse_conn_obj = ClickhouseConnection(
 | |
|             username="username",
 | |
|             hostPort="localhost:8123",
 | |
|             scheme=ClickhouseScheme.clickhouse_http,
 | |
|             databaseSchema=None,
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(clickhouse_conn_obj)
 | |
| 
 | |
|         # connection arguments with db
 | |
|         expected_url = "clickhouse+http://username:@localhost:8123/default"
 | |
|         clickhouse_conn_obj = ClickhouseConnection(
 | |
|             username="username",
 | |
|             hostPort="localhost:8123",
 | |
|             scheme=ClickhouseScheme.clickhouse_http,
 | |
|             databaseSchema="default",
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(clickhouse_conn_obj)
 | |
| 
 | |
|         expected_url = (
 | |
|             "clickhouse+http://username:@localhost:8123/default?protocol=https"
 | |
|         )
 | |
|         clickhouse_conn_obj = ClickhouseConnection(
 | |
|             username="username",
 | |
|             hostPort="localhost:8123",
 | |
|             scheme=ClickhouseScheme.clickhouse_http,
 | |
|             connectionOptions=dict(protocol="https"),
 | |
|             databaseSchema="default",
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(clickhouse_conn_obj)
 | |
| 
 | |
|     def test_mariadb_url(self):
 | |
|         # connection arguments without db
 | |
|         expected_url = "mysql+pymysql://openmetadata_user:@localhost:3306"
 | |
|         mariadb_conn_obj = MariaDBConnection(
 | |
|             username="openmetadata_user",
 | |
|             hostPort="localhost:3306",
 | |
|             scheme=MariaDBScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(mariadb_conn_obj)
 | |
| 
 | |
|         # connection arguments with db
 | |
|         expected_url = "mysql+pymysql://openmetadata_user:@localhost:3306"
 | |
|         mariadb_conn_obj = MariaDBConnection(
 | |
|             username="openmetadata_user",
 | |
|             hostPort="localhost:3306",
 | |
|             scheme=MariaDBScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(mariadb_conn_obj)
 | |
| 
 | |
|     def test_postgres_url(self):
 | |
|         # connection arguments with db
 | |
|         expected_url = "postgresql+psycopg2://openmetadata_user:@localhost:5432/default"
 | |
|         postgres_conn_obj = PostgresConnection(
 | |
|             username="openmetadata_user",
 | |
|             hostPort="localhost:5432",
 | |
|             database="default",
 | |
|             scheme=PostgresScheme.postgresql_psycopg2,
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(postgres_conn_obj)
 | |
| 
 | |
|     def test_redshift_url(self):
 | |
|         # connection arguments witho db
 | |
|         expected_url = "redshift+psycopg2://username:strong_password@cluster.name.region.redshift.amazonaws.com:5439/dev"
 | |
|         redshift_conn_obj = RedshiftConnection(
 | |
|             username="username",
 | |
|             password="strong_password",
 | |
|             hostPort="cluster.name.region.redshift.amazonaws.com:5439",
 | |
|             scheme=RedshiftScheme.redshift_psycopg2,
 | |
|             database="dev",
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(redshift_conn_obj)
 | |
| 
 | |
|     def test_singleStore_url(self):
 | |
|         # connection arguments without db
 | |
|         expected_url = "mysql+pymysql://openmetadata_user:@localhost:5432"
 | |
|         singleStore_conn_obj = SingleStoreConnection(
 | |
|             username="openmetadata_user",
 | |
|             hostPort="localhost:5432",
 | |
|             scheme=SingleStoreScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(singleStore_conn_obj)
 | |
| 
 | |
|         # connection arguments with db
 | |
|         expected_url = "mysql+pymysql://openmetadata_user:@localhost:5432"
 | |
|         singleStore_conn_obj = SingleStoreConnection(
 | |
|             username="openmetadata_user",
 | |
|             hostPort="localhost:5432",
 | |
|             scheme=SingleStoreScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(singleStore_conn_obj)
 | |
| 
 | |
|     def test_db2_url(self):
 | |
|         # connection arguments with db
 | |
|         expected_url = "db2+ibm_db://openmetadata_user:@localhost:50000/testdb"
 | |
|         db2_conn_obj = Db2Connection(
 | |
|             scheme=Db2Scheme.db2_ibm_db,
 | |
|             username="openmetadata_user",
 | |
|             hostPort="localhost:50000",
 | |
|             database="testdb",
 | |
|         )
 | |
|         assert expected_url == get_connection_url_common(db2_conn_obj)
 | |
| 
 | |
|     def test_snowflake_url(self):
 | |
|         # connection arguments without db
 | |
| 
 | |
|         from metadata.ingestion.source.database.snowflake.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         expected_url = "snowflake://coding:Abhi@ue18849.us-east-2.aws?account=ue18849.us-east-2.aws&warehouse=COMPUTE_WH"
 | |
|         snowflake_conn_obj = SnowflakeConnection(
 | |
|             scheme=SnowflakeScheme.snowflake,
 | |
|             username="coding",
 | |
|             password="Abhi",
 | |
|             warehouse="COMPUTE_WH",
 | |
|             account="ue18849.us-east-2.aws",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(snowflake_conn_obj)
 | |
| 
 | |
|     def test_snowflake_url(self):
 | |
|         from metadata.ingestion.source.database.snowflake.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         # Passing @ in username and password
 | |
|         expected_url = "snowflake://coding%40444:Abhi%40123@ue18849.us-east-2.aws?account=ue18849.us-east-2.aws&warehouse=COMPUTE_WH"
 | |
|         snowflake_conn_obj = SnowflakeConnection(
 | |
|             scheme=SnowflakeScheme.snowflake,
 | |
|             username="coding@444",
 | |
|             password="Abhi@123",
 | |
|             warehouse="COMPUTE_WH",
 | |
|             account="ue18849.us-east-2.aws",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(snowflake_conn_obj)
 | |
| 
 | |
|         # connection arguments with db
 | |
|         expected_url = "snowflake://coding:Abhi@ue18849.us-east-2.aws/testdb?account=ue18849.us-east-2.aws&warehouse=COMPUTE_WH"
 | |
|         snowflake_conn_obj = SnowflakeConnection(
 | |
|             scheme=SnowflakeScheme.snowflake,
 | |
|             username="coding",
 | |
|             password="Abhi",
 | |
|             database="testdb",
 | |
|             warehouse="COMPUTE_WH",
 | |
|             account="ue18849.us-east-2.aws",
 | |
|         )
 | |
|         assert expected_url == get_connection_url(snowflake_conn_obj)
 | |
| 
 | |
|     def test_mysql_conn_arguments(self):
 | |
|         # connection arguments without connectionArguments
 | |
|         expected_args = {}
 | |
|         mysql_conn_obj = MysqlConnection(
 | |
|             username="user",
 | |
|             authType=BasicAuth(
 | |
|                 password=None,
 | |
|             ),
 | |
|             hostPort="localhost:443",
 | |
|             connectionArguments=None,
 | |
|             scheme=MySQLScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(mysql_conn_obj)
 | |
| 
 | |
|         # connection arguments with connectionArguments
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         mysql_conn_obj = MysqlConnection(
 | |
|             username="user",
 | |
|             authType=BasicAuth(
 | |
|                 password=None,
 | |
|             ),
 | |
|             hostPort="localhost:443",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             scheme=MySQLScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(mysql_conn_obj)
 | |
| 
 | |
|     def test_clickhouse_conn_arguments(self):
 | |
|         # connection arguments without connectionArguments
 | |
|         expected_args = {}
 | |
|         clickhouse_conn_obj = ClickhouseConnection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             databaseSchema=None,
 | |
|             connectionArguments=None,
 | |
|             scheme=ClickhouseScheme.clickhouse_http,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(clickhouse_conn_obj)
 | |
| 
 | |
|         # connection arguments with connectionArguments
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         clickhouse_conn_obj = ClickhouseConnection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             databaseSchema="tiny",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             scheme=ClickhouseScheme.clickhouse_http,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(clickhouse_conn_obj)
 | |
| 
 | |
|     def test_mariadb_conn_arguments(self):
 | |
|         # connection arguments without connectionArguments
 | |
|         expected_args = {}
 | |
|         mariadb_conn_obj = MariaDBConnection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             connectionArguments=None,
 | |
|             scheme=MariaDBScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(mariadb_conn_obj)
 | |
| 
 | |
|         # connection arguments with connectionArguments
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         mariadb_conn_obj = MariaDBConnection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             scheme=MariaDBScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(mariadb_conn_obj)
 | |
| 
 | |
|     def test_postgres_conn_arguments(self):
 | |
|         # connection arguments without connectionArguments
 | |
|         expected_args = {}
 | |
|         postgres_conn_obj = PostgresConnection(
 | |
|             username="user",
 | |
|             authType=BasicAuth(
 | |
|                 password=None,
 | |
|             ),
 | |
|             database="postgres",
 | |
|             hostPort="localhost:443",
 | |
|             connectionArguments=None,
 | |
|             scheme=PostgresScheme.postgresql_psycopg2,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(postgres_conn_obj)
 | |
| 
 | |
|         # connection arguments with connectionArguments
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         postgres_conn_obj = PostgresConnection(
 | |
|             authType=BasicAuth(
 | |
|                 password=None,
 | |
|             ),
 | |
|             username="user",
 | |
|             hostPort="localhost:443",
 | |
|             database="tiny",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             scheme=PostgresScheme.postgresql_psycopg2,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(postgres_conn_obj)
 | |
| 
 | |
|     def test_redshift_conn_arguments(self):
 | |
|         # connection arguments without connectionArguments
 | |
|         expected_args = {}
 | |
|         redshift_conn_obj = RedshiftConnection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             database="tiny",
 | |
|             connectionArguments=None,
 | |
|             scheme=RedshiftScheme.redshift_psycopg2,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(redshift_conn_obj)
 | |
| 
 | |
|         # connection arguments with connectionArguments
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         redshift_conn_obj = RedshiftConnection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             database="tiny",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             scheme=RedshiftScheme.redshift_psycopg2,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(redshift_conn_obj)
 | |
| 
 | |
|     def test_singleStore_conn_arguments(self):
 | |
|         # connection arguments without connectionArguments
 | |
|         expected_args = {}
 | |
|         singleStore_conn_obj = SingleStoreConnection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             connectionArguments=None,
 | |
|             scheme=SingleStoreScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(singleStore_conn_obj)
 | |
| 
 | |
|         # connection arguments with connectionArguments
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         singleStore_conn_obj = SingleStoreConnection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             scheme=SingleStoreScheme.mysql_pymysql,
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(singleStore_conn_obj)
 | |
| 
 | |
|     def test_db2_conn_arguments(self):
 | |
|         # connection arguments without connectionArguments
 | |
|         expected_args = {}
 | |
|         db2_conn_obj = Db2Connection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             connectionArguments=None,
 | |
|             scheme=Db2Scheme.db2_ibm_db,
 | |
|             database="testdb",
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(db2_conn_obj)
 | |
| 
 | |
|         # connection arguments with connectionArguments
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         db2_conn_obj = Db2Connection(
 | |
|             username="user",
 | |
|             password=None,
 | |
|             hostPort="localhost:443",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             scheme=Db2Scheme.db2_ibm_db,
 | |
|             database="testdb",
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(db2_conn_obj)
 | |
| 
 | |
|     def test_snowflake_conn_arguments(self):
 | |
|         # connection arguments without connectionArguments
 | |
|         expected_args = {}
 | |
|         snowflake_conn_obj = SnowflakeConnection(
 | |
|             username="user",
 | |
|             password="test-pwd",
 | |
|             database="tiny",
 | |
|             warehouse="COMPUTE_WH",
 | |
|             scheme=SnowflakeScheme.snowflake,
 | |
|             account="account.region_name.cloud_service",
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(snowflake_conn_obj)
 | |
| 
 | |
|         # connection arguments with connectionArguments
 | |
|         expected_args = {"user": "user-to-be-impersonated"}
 | |
|         snowflake_conn_obj = SnowflakeConnection(
 | |
|             username="user",
 | |
|             password="test-pwd",
 | |
|             database="tiny",
 | |
|             warehouse="COMPUTE_WH",
 | |
|             connectionArguments={"user": "user-to-be-impersonated"},
 | |
|             scheme=SnowflakeScheme.snowflake,
 | |
|             account="account.region_name.cloud_service",
 | |
|         )
 | |
|         assert expected_args == get_connection_args_common(snowflake_conn_obj)
 | |
| 
 | |
|     def test_athena_url(self):
 | |
|         from metadata.ingestion.source.database.athena.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         # connection arguments without db
 | |
|         awsCreds = awsCredentials.AWSCredentials(
 | |
|             awsAccessKeyId="key", awsRegion="us-east-2", awsSecretAccessKey="secret_key"
 | |
|         )
 | |
| 
 | |
|         expected_url = "awsathena+rest://key:secret_key@athena.us-east-2.amazonaws.com:443?s3_staging_dir=s3%3A%2F%2Fpostgres%2Finput%2F&work_group=primary"
 | |
|         athena_conn_obj = AthenaConnection(
 | |
|             awsConfig=awsCreds,
 | |
|             s3StagingDir="s3://postgres/input/",
 | |
|             workgroup="primary",
 | |
|             scheme=AthenaScheme.awsathena_rest,
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(athena_conn_obj)
 | |
| 
 | |
|         # connection arguments witho db
 | |
|         expected_url = "awsathena+rest://key:secret_key@athena.us-east-2.amazonaws.com:443?s3_staging_dir=s3%3A%2F%2Fpostgres%2Fintput%2F&work_group=primary"
 | |
|         athena_conn_obj = AthenaConnection(
 | |
|             awsConfig=awsCreds,
 | |
|             s3StagingDir="s3://postgres/intput/",
 | |
|             workgroup="primary",
 | |
|             scheme=AthenaScheme.awsathena_rest,
 | |
|         )
 | |
|         assert expected_url == get_connection_url(athena_conn_obj)
 | |
| 
 | |
|     def test_mssql_url(self):
 | |
|         from metadata.ingestion.source.database.mssql.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         # connection arguments without db
 | |
|         expected_url = "mssql+pytds://sa:password@localhost:1433"
 | |
|         mssql_conn_obj = MssqlConnection(
 | |
|             username="sa",
 | |
|             password="password",
 | |
|             hostPort="localhost:1433",
 | |
|             scheme=MssqlScheme.mssql_pytds,
 | |
|             database=None,
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(mssql_conn_obj)
 | |
| 
 | |
|     def test_mssql_url(self):
 | |
|         from metadata.ingestion.source.database.mssql.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         # Passing @ in username and password
 | |
|         expected_url = "mssql+pytds://sa%40123:password%40444@localhost:1433/master"
 | |
|         mssql_conn_obj = MssqlConnection(
 | |
|             username="sa@123",
 | |
|             password="password@444",
 | |
|             hostPort="localhost:1433",
 | |
|             scheme=MssqlScheme.mssql_pytds,
 | |
|             database="master",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(mssql_conn_obj)
 | |
| 
 | |
|         # connection arguments witho db
 | |
|         expected_url = "mssql+pytds://sa:password@localhost:1433/catalog_test"
 | |
|         mssql_conn_obj = MssqlConnection(
 | |
|             username="sa",
 | |
|             password="password",
 | |
|             hostPort="localhost:1433",
 | |
|             scheme=MssqlScheme.mssql_pytds,
 | |
|             database="catalog_test",
 | |
|         )
 | |
|         assert expected_url == get_connection_url(mssql_conn_obj)
 | |
| 
 | |
|     def test_presto_url(self):
 | |
|         from metadata.ingestion.source.database.presto.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         # connection arguments without db
 | |
|         expected_url = "presto://admin@localhost:8080/test_catalog"
 | |
| 
 | |
|         presto_conn_obj = PrestoConnection(
 | |
|             username="admin",
 | |
|             hostPort="localhost:8080",
 | |
|             scheme=PrestoScheme.presto,
 | |
|             catalog="test_catalog",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(presto_conn_obj)
 | |
| 
 | |
|         # Passing @ in username and password
 | |
|         expected_url = "presto://admin%40333:pass%40111@localhost:8080/test_catalog"
 | |
| 
 | |
|         presto_conn_obj = PrestoConnection(
 | |
|             username="admin@333",
 | |
|             password="pass@111",
 | |
|             hostPort="localhost:8080",
 | |
|             scheme=PrestoScheme.presto,
 | |
|             catalog="test_catalog",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(presto_conn_obj)
 | |
| 
 | |
|     def test_presto_without_catalog(self):
 | |
|         from metadata.ingestion.source.database.presto.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         # Test presto url without catalog
 | |
|         expected_url = "presto://username:pass@localhost:8080"
 | |
|         presto_conn_obj = PrestoConnection(
 | |
|             scheme=PrestoScheme.presto,
 | |
|             hostPort="localhost:8080",
 | |
|             username="username",
 | |
|             password="pass",
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(presto_conn_obj)
 | |
| 
 | |
|     def test_oracle_url(self):
 | |
|         from metadata.ingestion.source.database.oracle.connection import (
 | |
|             get_connection_url,
 | |
|         )
 | |
| 
 | |
|         # oracle with db
 | |
|         expected_url = "oracle+cx_oracle://admin:password@localhost:1541/testdb"
 | |
| 
 | |
|         oracle_conn_obj = OracleConnection(
 | |
|             username="admin",
 | |
|             password="password",
 | |
|             hostPort="localhost:1541",
 | |
|             scheme=OracleScheme.oracle_cx_oracle,
 | |
|             oracleConnectionType=OracleDatabaseSchema(databaseSchema="testdb"),
 | |
|         )
 | |
| 
 | |
|         assert expected_url == get_connection_url(oracle_conn_obj)
 | |
| 
 | |
|         # oracle with service name
 | |
|         expected_url = (
 | |
|             "oracle+cx_oracle://admin:password@localhost:1541/?service_name=testdb"
 | |
|         )
 | |
| 
 | |
|         oracle_conn_obj = OracleConnection(
 | |
|             username="admin",
 | |
|             password="password",
 | |
|             hostPort="localhost:1541",
 | |
|             scheme=OracleScheme.oracle_cx_oracle,
 | |
|             oracleConnectionType=OracleServiceName(oracleServiceName="testdb"),
 | |
|         )
 | |
|         assert expected_url == get_connection_url(oracle_conn_obj)
 | |
| 
 | |
|         # oracle with db & connection options
 | |
|         expected_url = [
 | |
|             "oracle+cx_oracle://admin:password@localhost:1541/testdb?test_key_2=test_value_2&test_key_1=test_value_1",
 | |
|             "oracle+cx_oracle://admin:password@localhost:1541/testdb?test_key_1=test_value_1&test_key_2=test_value_2",
 | |
|         ]
 | |
| 
 | |
|         oracle_conn_obj = OracleConnection(
 | |
|             username="admin",
 | |
|             password="password",
 | |
|             hostPort="localhost:1541",
 | |
|             scheme=OracleScheme.oracle_cx_oracle,
 | |
|             oracleConnectionType=OracleDatabaseSchema(databaseSchema="testdb"),
 | |
|             connectionOptions=dict(
 | |
|                 test_key_1="test_value_1", test_key_2="test_value_2"
 | |
|             ),
 | |
|         )
 | |
|         assert get_connection_url(oracle_conn_obj) in expected_url
 | |
| 
 | |
|         # oracle with service name & connection options
 | |
|         expected_url = [
 | |
|             "oracle+cx_oracle://admin:password@localhost:1541/?service_name=testdb&test_key_2=test_value_2&test_key_1=test_value_1",
 | |
|             "oracle+cx_oracle://admin:password@localhost:1541/?service_name=testdb&test_key_1=test_value_1&test_key_2=test_value_2",
 | |
|         ]
 | |
| 
 | |
|         oracle_conn_obj = OracleConnection(
 | |
|             username="admin",
 | |
|             password="password",
 | |
|             hostPort="localhost:1541",
 | |
|             scheme=OracleScheme.oracle_cx_oracle,
 | |
|             oracleConnectionType=OracleServiceName(oracleServiceName="testdb"),
 | |
|             connectionOptions=dict(
 | |
|                 test_key_1="test_value_1", test_key_2="test_value_2"
 | |
|             ),
 | |
|         )
 | |
|         assert get_connection_url(oracle_conn_obj) in expected_url
 | |
| 
 | |
|         tns_connection = (
 | |
|             "(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=TCP)"
 | |
|             "(HOST=myhost)(PORT=1530)))(CONNECT_DATA=(SID=MYSERVICENAME)))"
 | |
|         )
 | |
|         expected_url = f"oracle+cx_oracle://admin:password@{tns_connection}"
 | |
| 
 | |
|         oracle_conn_obj = OracleConnection(
 | |
|             username="admin",
 | |
|             password="password",
 | |
|             hostPort="localhost:1541",  # We will ignore it here
 | |
|             oracleConnectionType=OracleTNSConnection(
 | |
|                 oracleTNSConnection=tns_connection
 | |
|             ),
 | |
|         )
 | |
|         assert get_connection_url(oracle_conn_obj) == expected_url
 |