fix: catch error when masking encrypted extra is none (#21570)

This commit is contained in:
Elizabeth Thompson 2022-10-02 19:49:01 -07:00 committed by GitHub
parent c1ba3290d9
commit ef78ec6b30
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
6 changed files with 132 additions and 17 deletions

View File

@ -1618,7 +1618,7 @@ class BaseEngineSpec: # pylint: disable=too-many-public-methods
return user.username if user else None
@classmethod
def mask_encrypted_extra(cls, encrypted_extra: str) -> str:
def mask_encrypted_extra(cls, encrypted_extra: Optional[str]) -> Optional[str]:
"""
Mask ``encrypted_extra``.
@ -1631,7 +1631,9 @@ class BaseEngineSpec: # pylint: disable=too-many-public-methods
# pylint: disable=unused-argument
@classmethod
def unmask_encrypted_extra(cls, old: str, new: str) -> str:
def unmask_encrypted_extra(
cls, old: Optional[str], new: Optional[str]
) -> Optional[str]:
"""
Remove masks from ``encrypted_extra``.

View File

@ -396,10 +396,13 @@ class BigQueryEngineSpec(BaseEngineSpec):
raise ValidationError("Invalid service credentials")
@classmethod
def mask_encrypted_extra(cls, encrypted_extra: str) -> str:
def mask_encrypted_extra(cls, encrypted_extra: Optional[str]) -> Optional[str]:
if encrypted_extra is None:
return encrypted_extra
try:
config = json.loads(encrypted_extra)
except json.JSONDecodeError:
except (json.JSONDecodeError, TypeError):
return encrypted_extra
try:
@ -410,14 +413,19 @@ class BigQueryEngineSpec(BaseEngineSpec):
return json.dumps(config)
@classmethod
def unmask_encrypted_extra(cls, old: str, new: str) -> str:
def unmask_encrypted_extra(
cls, old: Optional[str], new: Optional[str]
) -> Optional[str]:
"""
Reuse ``private_key`` if available and unchanged.
"""
if old is None or new is None:
return new
try:
old_config = json.loads(old)
new_config = json.loads(new)
except json.JSONDecodeError:
except (TypeError, json.JSONDecodeError):
return new
if "credentials_info" not in new_config:

View File

@ -140,10 +140,13 @@ class GSheetsEngineSpec(SqliteEngineSpec):
raise ValidationError("Invalid service credentials")
@classmethod
def mask_encrypted_extra(cls, encrypted_extra: str) -> str:
def mask_encrypted_extra(cls, encrypted_extra: Optional[str]) -> Optional[str]:
if encrypted_extra is None:
return encrypted_extra
try:
config = json.loads(encrypted_extra)
except json.JSONDecodeError:
except (TypeError, json.JSONDecodeError):
return encrypted_extra
try:
@ -154,14 +157,19 @@ class GSheetsEngineSpec(SqliteEngineSpec):
return json.dumps(config)
@classmethod
def unmask_encrypted_extra(cls, old: str, new: str) -> str:
def unmask_encrypted_extra(
cls, old: Optional[str], new: Optional[str]
) -> Optional[str]:
"""
Reuse ``private_key`` if available and unchanged.
"""
if old is None or new is None:
return new
try:
old_config = json.loads(old)
new_config = json.loads(new)
except json.JSONDecodeError:
except (TypeError, json.JSONDecodeError):
return new
if "service_account_info" not in new_config:

View File

@ -248,7 +248,7 @@ class Database(
return sqlalchemy_url.get_backend_name()
@property
def masked_encrypted_extra(self) -> str:
def masked_encrypted_extra(self) -> Optional[str]:
return self.db_engine_spec.mask_encrypted_extra(self.encrypted_extra)
@property
@ -261,10 +261,12 @@ class Database(
masked_encrypted_extra = db_engine_spec.mask_encrypted_extra(
self.encrypted_extra
)
try:
encrypted_config = json.loads(masked_encrypted_extra)
except (TypeError, json.JSONDecodeError):
encrypted_config = {}
encrypted_config = {}
if masked_encrypted_extra is not None:
try:
encrypted_config = json.loads(masked_encrypted_extra)
except (TypeError, json.JSONDecodeError):
pass
try:
# pylint: disable=useless-suppression

View File

@ -186,9 +186,61 @@ def test_unmask_encrypted_extra() -> None:
}
)
assert json.loads(BigQueryEngineSpec.unmask_encrypted_extra(old, new)) == {
assert json.loads(str(BigQueryEngineSpec.unmask_encrypted_extra(old, new))) == {
"credentials_info": {
"project_id": "yellow-unicorn-314419",
"private_key": "SECRET",
},
}
def test_unmask_encrypted_extra_when_empty() -> None:
"""
Test that a None value works for ``encrypted_extra``.
"""
from superset.db_engine_specs.bigquery import BigQueryEngineSpec
old = None
new = json.dumps(
{
"credentials_info": {
"project_id": "yellow-unicorn-314419",
"private_key": "XXXXXXXXXX",
},
}
)
assert json.loads(str(BigQueryEngineSpec.unmask_encrypted_extra(old, new))) == {
"credentials_info": {
"project_id": "yellow-unicorn-314419",
"private_key": "XXXXXXXXXX",
},
}
def test_unmask_encrypted_extra_when_new_is_empty() -> None:
"""
Test that a None value works for ``encrypted_extra``.
"""
from superset.db_engine_specs.bigquery import BigQueryEngineSpec
old = json.dumps(
{
"credentials_info": {
"project_id": "black-sanctum-314419",
"private_key": "SECRET",
},
}
)
new = None
assert BigQueryEngineSpec.unmask_encrypted_extra(old, new) is None
def test_mask_encrypted_extra_when_empty() -> None:
"""
Test that the encrypted extra will return a none value if the field is empty.
"""
from superset.db_engine_specs.bigquery import BigQueryEngineSpec
assert BigQueryEngineSpec.mask_encrypted_extra(None) is None

View File

@ -228,9 +228,52 @@ def test_unmask_encrypted_extra() -> None:
}
)
assert json.loads(GSheetsEngineSpec.unmask_encrypted_extra(old, new)) == {
assert json.loads(str(GSheetsEngineSpec.unmask_encrypted_extra(old, new))) == {
"service_account_info": {
"project_id": "yellow-unicorn-314419",
"private_key": "SECRET",
},
}
def test_unmask_encrypted_extra_when_old_is_none() -> None:
"""
Test that a None value works for ``encrypted_extra``.
"""
from superset.db_engine_specs.gsheets import GSheetsEngineSpec
old = None
new = json.dumps(
{
"service_account_info": {
"project_id": "yellow-unicorn-314419",
"private_key": "XXXXXXXXXX",
},
}
)
assert json.loads(str(GSheetsEngineSpec.unmask_encrypted_extra(old, new))) == {
"service_account_info": {
"project_id": "yellow-unicorn-314419",
"private_key": "XXXXXXXXXX",
},
}
def test_unmask_encrypted_extra_when_new_is_none() -> None:
"""
Test that a None value works for ``encrypted_extra``.
"""
from superset.db_engine_specs.gsheets import GSheetsEngineSpec
old = json.dumps(
{
"service_account_info": {
"project_id": "yellow-unicorn-314419",
"private_key": "XXXXXXXXXX",
},
}
)
new = None
assert GSheetsEngineSpec.unmask_encrypted_extra(old, new) is None