forked from elastic/connectors
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtest_atlassian.py
145 lines (138 loc) · 4.35 KB
/
test_atlassian.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
#
# Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
# or more contributor license agreements. Licensed under the Elastic License 2.0;
# you may not use this file except in compliance with the Elastic License 2.0.
#
from unittest.mock import ANY
import pytest
from connectors.filtering.validation import (
AdvancedRulesValidator,
SyncRuleValidationResult,
)
from connectors.sources.atlassian import (
AtlassianAccessControl,
AtlassianAdvancedRulesValidator,
)
from connectors.sources.jira import JiraClient, JiraDataSource
from tests.sources.support import create_source
@pytest.mark.parametrize(
"advanced_rules, expected_validation_result",
[
(
# valid: empty array should be valid
[],
SyncRuleValidationResult.valid_result(
SyncRuleValidationResult.ADVANCED_RULES
),
),
(
# valid: empty object should also be valid -> default value in Kibana
{},
SyncRuleValidationResult.valid_result(
SyncRuleValidationResult.ADVANCED_RULES
),
),
(
# valid: one custom query
[{"query": "type=A"}],
SyncRuleValidationResult.valid_result(
SyncRuleValidationResult.ADVANCED_RULES
),
),
(
# valid: two custom queries
[{"query": "type=A"}, {"query": "type=B"}],
SyncRuleValidationResult.valid_result(
SyncRuleValidationResult.ADVANCED_RULES
),
),
(
# invalid: query empty
[{"query": "type=A"}, {"query": ""}],
SyncRuleValidationResult(
SyncRuleValidationResult.ADVANCED_RULES,
is_valid=False,
validation_message=ANY,
),
),
(
# invalid: unallowed key
[{"query": "type=A"}, {"queries": "type=B"}],
SyncRuleValidationResult(
SyncRuleValidationResult.ADVANCED_RULES,
is_valid=False,
validation_message=ANY,
),
),
(
# invalid: list of strings -> wrong type
{"query": ["type=A"]},
SyncRuleValidationResult(
SyncRuleValidationResult.ADVANCED_RULES,
is_valid=False,
validation_message=ANY,
),
),
(
# invalid: array of arrays -> wrong type
{"query": ["type=A", ""]},
SyncRuleValidationResult(
SyncRuleValidationResult.ADVANCED_RULES,
is_valid=False,
validation_message=ANY,
),
),
],
)
@pytest.mark.asyncio
async def test_advanced_rules_validation(advanced_rules, expected_validation_result):
validation_result = await AtlassianAdvancedRulesValidator(
AdvancedRulesValidator
).validate(advanced_rules)
assert validation_result == expected_validation_result
@pytest.mark.parametrize(
"user_info, result",
[
(
{
"self": "url1",
"accountId": "607194d6bc3c3f006f4c35d6",
"accountType": "atlassian",
"displayName": "user1",
"locale": "en-US",
"emailAddress": "[email protected]",
"active": True,
},
True,
),
(
{
"self": "url1",
"accountId": "607194d6bc3c3f006f4c35d6",
"accountType": "app",
"displayName": "user1",
"active": True,
},
False,
),
(
{
"self": "url1",
"accountId": "607194d6bc3c3f006f4c35d6",
"accountType": "atlassian",
"displayName": "user1",
"locale": "en-US",
"emailAddress": "[email protected]",
"active": False,
},
False,
),
],
)
@pytest.mark.asyncio
async def test_active_atlassian_user(user_info, result):
async with create_source(JiraDataSource) as source:
validation_result = AtlassianAccessControl(
source, JiraClient
).is_active_atlassian_user(user_info)
assert validation_result == result