|
23 | 23 | from uuid import uuid4
|
24 | 24 |
|
25 | 25 | from django.test import TestCase, override_settings
|
| 26 | + |
26 | 27 | from django.utils import timezone
|
27 | 28 |
|
28 | 29 | from api.models import CrossAccountRequest, Tenant
|
29 | 30 |
|
30 | 31 | from management.models import *
|
31 |
| -from management.role.definer import seed_roles |
| 32 | + |
32 | 33 | from management.tenant_service.tenant_service import BootstrappedTenant
|
33 | 34 | from management.tenant_service.v2 import V2TenantBootstrapService
|
34 | 35 | from migration_tool.in_memory_tuples import (
|
|
43 | 44 | subject,
|
44 | 45 | subject_type,
|
45 | 46 | )
|
46 |
| -from migration_tool.migrate import migrate_data |
| 47 | + |
| 48 | +from migration_tool.migrate import migrate_data, migrate_groups_for_tenant |
| 49 | + |
47 | 50 | from management.group.definer import seed_group, clone_default_group_in_public_schema
|
48 | 51 | from tests.management.role.test_dual_write import RbacFixture
|
49 | 52 |
|
@@ -161,6 +164,14 @@ def setUp(self):
|
161 | 164 | )
|
162 | 165 | self.cross_account_request.roles.add(self.system_role_2)
|
163 | 166 |
|
| 167 | + @override_settings(REPLICATION_TO_RELATION_ENABLED=True, PRINCIPAL_USER_DOMAIN="redhat", READ_ONLY_API_MODE=True) |
| 168 | + @patch("migration_tool.migrate.RelationApiDualWriteGroupHandler.replicate") |
| 169 | + def test_migration_of_data_no_replication_event_to_migrate_groups(self, replicate_method): |
| 170 | + """Test that we get the correct access for a principal.""" |
| 171 | + kwargs = {"exclude_apps": ["app1"], "orgs": ["7654321"]} |
| 172 | + migrate_data(**kwargs) |
| 173 | + replicate_method.assert_not_called() |
| 174 | + |
164 | 175 | @override_settings(REPLICATION_TO_RELATION_ENABLED=True, PRINCIPAL_USER_DOMAIN="redhat", READ_ONLY_API_MODE=True)
|
165 | 176 | @patch("management.relation_replicator.logging_replicator.logger")
|
166 | 177 | def test_migration_of_data(self, logger_mock):
|
|
0 commit comments