Skip to content

Commit de91b99

Browse files
authored
[Key Vault] Correctly skip unconfigured tests (#24301)
1 parent daa7573 commit de91b99

3 files changed

Lines changed: 25 additions & 43 deletions

File tree

sdk/keyvault/azure-keyvault-keys/tests/_async_test_case.py

Lines changed: 11 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -23,26 +23,16 @@ async def get_attestation_token(attestation_uri):
2323
def get_decorator(only_hsm=False, only_vault=False, api_versions=None, **kwargs):
2424
"""returns a test decorator for test parameterization"""
2525
params = [
26-
pytest.param(p[0],p[1], id=p[0] + ("_mhsm" if p[1] else "_vault" ))
26+
pytest.param(p[0], p[1], id=p[0] + ("_mhsm" if p[1] else "_vault"))
2727
for p in get_test_parameters(only_hsm, only_vault, api_versions=api_versions)
2828
]
2929
return params
3030

3131

3232
def get_release_policy(attestation_uri, **kwargs):
3333
release_policy_json = {
34-
"anyOf": [
35-
{
36-
"anyOf": [
37-
{
38-
"claim": "sdk-test",
39-
"equals": True
40-
}
41-
],
42-
"authority": attestation_uri.rstrip("/") + "/"
43-
}
44-
],
45-
"version": "1.0.0"
34+
"anyOf": [{"anyOf": [{"claim": "sdk-test", "equals": True}], "authority": attestation_uri.rstrip("/") + "/"}],
35+
"version": "1.0.0",
4636
}
4737
policy_string = json.dumps(release_policy_json).encode()
4838
return KeyReleasePolicy(policy_string, **kwargs)
@@ -63,9 +53,9 @@ def get_test_parameters(only_hsm=False, only_vault=False, api_versions=None):
6353

6454

6555
def is_public_cloud():
66-
return (".microsoftonline.com" in os.getenv('AZURE_AUTHORITY_HOST', ''))
56+
return ".microsoftonline.com" in os.getenv("AZURE_AUTHORITY_HOST", "")
57+
6758

68-
6959
class AsyncKeysClientPreparer(AzureRecordedTestCase):
7060
def __init__(self, *args, **kwargs):
7161
vault_playback_url = "https://vaultname.vault.azure.net"
@@ -83,25 +73,25 @@ def __init__(self, *args, **kwargs):
8373

8474
def __call__(self, fn):
8575
async def _preparer(test_class, api_version, is_hsm, **kwargs):
86-
76+
8777
self._skip_if_not_configured(api_version, is_hsm)
8878
if not self.is_logging_enabled:
8979
kwargs.update({"logging_enable": False})
9080
endpoint_url = self.managed_hsm_url if is_hsm else self.vault_url
9181
client = self.create_key_client(endpoint_url, api_version=api_version, **kwargs)
9282
async with client:
93-
await fn(test_class, client, is_hsm=is_hsm, managed_hsm_url = self.managed_hsm_url, vault_url = self.vault_url)
83+
await fn(
84+
test_class, client, is_hsm=is_hsm, managed_hsm_url=self.managed_hsm_url, vault_url=self.vault_url
85+
)
9486

9587
return _preparer
96-
97-
9888

9989
def create_key_client(self, vault_uri, **kwargs):
100-
90+
10191
from azure.keyvault.keys.aio import KeyClient
10292

10393
credential = self.get_credential(KeyClient, is_async=True)
104-
94+
10595
return self.create_client_from_credential(KeyClient, credential=credential, vault_url=vault_uri, **kwargs)
10696

10797
def _set_mgmt_settings_real_values(self):

sdk/keyvault/azure-keyvault-keys/tests/_keys_test_case.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
# ------------------------------------
2+
# Copyright (c) Microsoft Corporation.
3+
# Licensed under the MIT License.
4+
# ------------------------------------
15
import os
26

37
import pytest

sdk/keyvault/azure-keyvault-keys/tests/_test_case.py

Lines changed: 10 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -23,26 +23,16 @@ def get_attestation_token(attestation_uri):
2323
def get_decorator(only_hsm=False, only_vault=False, api_versions=None, **kwargs):
2424
"""returns a test decorator for test parameterization"""
2525
params = [
26-
pytest.param(p[0],p[1], id=p[0] + ("_mhsm" if p[1] else "_vault" ))
26+
pytest.param(p[0], p[1], id=p[0] + ("_mhsm" if p[1] else "_vault"))
2727
for p in get_test_parameters(only_hsm, only_vault, api_versions=api_versions)
2828
]
2929
return params
3030

3131

3232
def get_release_policy(attestation_uri, **kwargs):
3333
release_policy_json = {
34-
"anyOf": [
35-
{
36-
"anyOf": [
37-
{
38-
"claim": "sdk-test",
39-
"equals": True
40-
}
41-
],
42-
"authority": attestation_uri.rstrip("/") + "/"
43-
}
44-
],
45-
"version": "1.0.0"
34+
"anyOf": [{"anyOf": [{"claim": "sdk-test", "equals": True}], "authority": attestation_uri.rstrip("/") + "/"}],
35+
"version": "1.0.0",
4636
}
4737
policy_string = json.dumps(release_policy_json).encode()
4838
return KeyReleasePolicy(policy_string, **kwargs)
@@ -63,9 +53,9 @@ def get_test_parameters(only_hsm=False, only_vault=False, api_versions=None):
6353

6454

6555
def is_public_cloud():
66-
return (".microsoftonline.com" in os.getenv('AZURE_AUTHORITY_HOST', ''))
56+
return ".microsoftonline.com" in os.getenv("AZURE_AUTHORITY_HOST", "")
57+
6758

68-
6959
class KeysClientPreparer(AzureRecordedTestCase):
7060
def __init__(self, *args, **kwargs):
7161
vault_playback_url = "https://vaultname.vault.azure.net"
@@ -87,26 +77,24 @@ def __init__(self, *args, **kwargs):
8777
def __call__(self, fn):
8878
def _preparer(test_class, api_version, is_hsm, **kwargs):
8979

90-
#self._skip_if_not_configured(api_version, is_hsm)
80+
self._skip_if_not_configured(api_version, is_hsm)
9181
if not self.is_logging_enabled:
9282
kwargs.update({"logging_enable": False})
9383
endpoint_url = self.managed_hsm_url if is_hsm else self.vault_url
9484
client = self.create_key_client(endpoint_url, api_version=api_version, **kwargs)
9585

9686
with client:
97-
fn(test_class, client, is_hsm=is_hsm, managed_hsm_url = self.managed_hsm_url, vault_url = self.vault_url)
98-
return _preparer
99-
87+
fn(test_class, client, is_hsm=is_hsm, managed_hsm_url=self.managed_hsm_url, vault_url=self.vault_url)
10088

89+
return _preparer
10190

10291
def create_key_client(self, vault_uri, **kwargs):
103-
92+
10493
from azure.keyvault.keys import KeyClient
10594

10695
credential = self.get_credential(KeyClient)
107-
108-
return self.create_client_from_credential(KeyClient, credential=credential, vault_url=vault_uri, **kwargs)
10996

97+
return self.create_client_from_credential(KeyClient, credential=credential, vault_url=vault_uri, **kwargs)
11098

11199
def _set_mgmt_settings_real_values(self):
112100
if self.is_live:

0 commit comments

Comments
 (0)