Skip to content
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Prev Previous commit
Next Next commit
Sanitize recorded API versions of Keys requests
  • Loading branch information
mccoyp committed Jan 30, 2024
commit cd4e89df6c5d7c9fd6b1e67649a58379d210852b
2 changes: 1 addition & 1 deletion sdk/keyvault/azure-keyvault-administration/assets.json
Original file line number Diff line number Diff line change
Expand Up @@ -2,5 +2,5 @@
"AssetsRepo": "Azure/azure-sdk-assets",
"AssetsRepoPrefixPath": "python",
"TagPrefix": "python/keyvault/azure-keyvault-administration",
"Tag": "python/keyvault/azure-keyvault-administration_2569b8a92d"
"Tag": "python/keyvault/azure-keyvault-administration_b16e831fc9"
}
39 changes: 20 additions & 19 deletions sdk/keyvault/azure-keyvault-administration/tests/conftest.py
Original file line number Diff line number Diff line change
Expand Up @@ -3,15 +3,17 @@
# Licensed under the MIT License. See LICENSE.txt in the project root for
# license information.
# -------------------------------------------------------------------------
import asyncio
import os
from unittest import mock


import pytest
from devtools_testutils import (add_general_regex_sanitizer,
add_oauth_response_sanitizer, is_live,
test_proxy)
from devtools_testutils import (
add_general_string_sanitizer,
add_oauth_response_sanitizer,
add_uri_regex_sanitizer,
is_live,
)

os.environ['PYTHONHASHSEED'] = '0'

Expand All @@ -30,15 +32,20 @@ def add_sanitizers(test_proxy):
client_id = os.environ.get("KEYVAULT_CLIENT_ID", "service-principal-id")
sas_token = os.environ.get("BLOB_STORAGE_SAS_TOKEN","fake-sas")

add_general_regex_sanitizer(regex=azure_keyvault_url, value="https://vaultname.vault.azure.net")
add_general_regex_sanitizer(regex=keyvault_tenant_id, value="00000000-0000-0000-0000-000000000000")
add_general_regex_sanitizer(regex=keyvault_subscription_id, value="00000000-0000-0000-0000-000000000000")
add_general_regex_sanitizer(regex=azure_managedhsm_url,value="https://managedhsmvaultname.managedhsm.azure.net")
add_general_regex_sanitizer(regex=azure_attestation_uri,value="https://fakeattestation.azurewebsites.net")
add_general_regex_sanitizer(regex=storage_name, value = "blob_storage_account_name")
add_general_regex_sanitizer(regex=storage_endpoint_suffix, value = "keyvault_endpoint_suffix")
add_general_regex_sanitizer(regex=sas_token, value="fake-sas")
add_general_regex_sanitizer(regex=client_id, value = "service-principal-id")
add_general_string_sanitizer(target=azure_keyvault_url, value="https://vaultname.vault.azure.net")
add_general_string_sanitizer(target=keyvault_tenant_id, value="00000000-0000-0000-0000-000000000000")
add_general_string_sanitizer(target=keyvault_subscription_id, value="00000000-0000-0000-0000-000000000000")
add_general_string_sanitizer(target=azure_managedhsm_url,value="https://managedhsmvaultname.managedhsm.azure.net")
add_general_string_sanitizer(target=azure_attestation_uri,value="https://fakeattestation.azurewebsites.net")
add_general_string_sanitizer(target=storage_name, value = "blob_storage_account_name")
add_general_string_sanitizer(target=storage_endpoint_suffix, value = "keyvault_endpoint_suffix")
add_general_string_sanitizer(target=sas_token, value="fake-sas")
add_general_string_sanitizer(target=client_id, value = "service-principal-id")
# Sanitize API versions of `azure-keyvault-keys` requests
add_uri_regex_sanitizer(
regex="keys/([^/]*)/create\\?api-version=(\\S*)", value="keys/$1/create?api-version=sanitized"
)
add_uri_regex_sanitizer(regex="keys/([^/]*)\\?api-version=(\\S*)", value="keys/$1?api-version=sanitized")
add_oauth_response_sanitizer()


Expand Down Expand Up @@ -66,9 +73,3 @@ def immediate_return(_):

else:
yield

@pytest.fixture(scope="session")
def event_loop(request):
loop = asyncio.get_event_loop()
yield loop
loop.close()