|
| 1 | +#!/usr/bin/env python |
| 2 | + |
| 3 | +# |
| 4 | +# Licensed to the Apache Software Foundation (ASF) under one or more |
| 5 | +# contributor license agreements. See the NOTICE file distributed with |
| 6 | +# this work for additional information regarding copyright ownership. |
| 7 | +# The ASF licenses this file to You under the Apache License, Version 2.0 |
| 8 | +# (the "License"); you may not use this file except in compliance with |
| 9 | +# the License. You may obtain a copy of the License at |
| 10 | +# |
| 11 | +# http://www.apache.org/licenses/LICENSE-2.0 |
| 12 | +# |
| 13 | +# Unless required by applicable law or agreed to in writing, software |
| 14 | +# distributed under the License is distributed on an "AS IS" BASIS, |
| 15 | +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 16 | +# See the License for the specific language governing permissions and |
| 17 | +# limitations under the License. |
| 18 | + |
| 19 | +from apache_ranger.model.ranger_service import * |
| 20 | +from apache_ranger.client.ranger_client import * |
| 21 | +from apache_ranger.model.ranger_policy import * |
| 22 | + |
| 23 | + |
| 24 | +class TestPolicyManagement: |
| 25 | + ROBOT_LIBRARY_SCOPE = 'SUITE' |
| 26 | + |
| 27 | + def __init__(self, ranger_url, username, password): |
| 28 | + self.ranger = RangerClient(ranger_url, (username, password)) |
| 29 | + self.login_user = username |
| 30 | + self.ranger.session.verify = False |
| 31 | + self.test_hive_policy_prefix = 'test_hive_policy' |
| 32 | + self.test_hive_db_prefix = 'test_hive_db' |
| 33 | + self.test_hive_table_prefix = 'test_hive_table' |
| 34 | + return |
| 35 | + |
| 36 | + def get_hive_policy(self, service_name, policy_name): |
| 37 | + return self.ranger.get_policy(service_name, policy_name) |
| 38 | + |
| 39 | + def delete_hive_policy(self, service_name, policy_name): |
| 40 | + return self.ranger.delete_policy(service_name, policy_name) |
| 41 | + |
| 42 | + @staticmethod |
| 43 | + def _create_policy_item_accesses(access_types): |
| 44 | + ret = [] |
| 45 | + for access_type in access_types: |
| 46 | + ret.append(RangerPolicyItemAccess({'type': access_type})) |
| 47 | + return ret |
| 48 | + |
| 49 | + @staticmethod |
| 50 | + def _create_policy_item(users, access_types): |
| 51 | + allow_item = RangerPolicyItem() |
| 52 | + allow_item.users = users |
| 53 | + allow_item.accesses = TestPolicyManagement._create_policy_item_accesses(access_types) |
| 54 | + return allow_item |
| 55 | + |
| 56 | + @staticmethod |
| 57 | + def _create_policy_item_with_delegate_admin(users, access_types): |
| 58 | + allow_item = TestPolicyManagement._create_policy_item(users, access_types) |
| 59 | + allow_item.delegateAdmin = True |
| 60 | + return allow_item |
| 61 | + |
| 62 | + @staticmethod |
| 63 | + def _create_hive_policy_resource(db_name, table_name, column_name): |
| 64 | + resources = { |
| 65 | + 'database': RangerPolicyResource({'values': [db_name]}), |
| 66 | + 'table': RangerPolicyResource({'values': [table_name]}), |
| 67 | + 'column': RangerPolicyResource({'values': [column_name]}) |
| 68 | + } |
| 69 | + return resources |
| 70 | + |
| 71 | + def create_hive_policy(self, service_name, policy_name, db_name, table_name): |
| 72 | + policy = RangerPolicy() |
| 73 | + policy.service = service_name |
| 74 | + policy.name = policy_name |
| 75 | + policy.resources = TestPolicyManagement._create_hive_policy_resource(db_name, table_name, "*") |
| 76 | + allow_item = TestPolicyManagement._create_policy_item_with_delegate_admin(['test_user_1'], ['create', 'alter']) |
| 77 | + deny_item = TestPolicyManagement._create_policy_item([self.login_user], ['drop']) |
| 78 | + policy.policyItems = [allow_item] |
| 79 | + policy.denyPolicyItems = [deny_item] |
| 80 | + |
| 81 | + created_policy = self.ranger.create_policy(policy) |
| 82 | + print(f'Created policy: name={created_policy.name}, id={created_policy.id}') |
| 83 | + return created_policy |
| 84 | + |
| 85 | + def get_all_policies(self): |
| 86 | + all_policies = self.ranger.find_policies() |
| 87 | + return all_policies |
| 88 | + |
| 89 | + def create_policies_in_bulk(self, service_name, count): |
| 90 | + count = int(count) |
| 91 | + for i in range(count): |
| 92 | + policy_name = f'{self.test_hive_policy_prefix}_{i}' |
| 93 | + db_name = f'{self.test_hive_db_prefix}_{i}' |
| 94 | + table_name = f'{self.test_hive_table_prefix}_{i}' |
| 95 | + self.create_hive_policy(service_name, policy_name, db_name, table_name) |
| 96 | + return |
| 97 | + |
| 98 | + def delete_policies_in_bulk(self, service_name, count): |
| 99 | + count = int(count) |
| 100 | + for i in range(count): |
| 101 | + policy_name = f'{self.test_hive_policy_prefix}_{i}' |
| 102 | + self.delete_hive_policy(service_name, policy_name) |
| 103 | + return |
| 104 | + |
| 105 | + |
| 106 | +class TestServiceManagement: |
| 107 | + ROBOT_LIBRARY_SCOPE = 'SUITE' |
| 108 | + |
| 109 | + def __init__(self, ranger_url, username, password): |
| 110 | + self.ranger = RangerClient(ranger_url, (username, password)) |
| 111 | + self.ranger.session.verify = False |
| 112 | + return |
| 113 | + |
| 114 | + def create_service(self, service_name, service_type, configs): |
| 115 | + service = RangerService() |
| 116 | + service.name = service_name |
| 117 | + service.type = service_type |
| 118 | + service.configs = configs |
| 119 | + return self.ranger.create_service(service) |
| 120 | + |
| 121 | + def delete_service(self, service_name): |
| 122 | + return self.ranger.delete_service(service_name) |
| 123 | + |
0 commit comments