1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95
|
# ------------------------------------
# Copyright (c) Microsoft Corporation.
# Licensed under the MIT License.
# ------------------------------------
import functools
import os
import uuid
from azure.keyvault.administration import KeyVaultAccessControlClient, KeyVaultRoleScope
from devtools_testutils import KeyVaultPreparer, ResourceGroupPreparer
import pytest
from _shared.test_case import KeyVaultTestCase
from _shared.preparer import KeyVaultClientPreparer as _KeyVaultClientPreparer
AccessControlClientPreparer = functools.partial(_KeyVaultClientPreparer, KeyVaultAccessControlClient)
class AccessControlTests(KeyVaultTestCase):
def __init__(self, *args, **kwargs):
super(AccessControlTests, self).__init__(*args, **kwargs)
if self.is_live:
pytest.skip("test infrastructure can't yet create a Key Vault supporting the RBAC API")
def get_replayable_uuid(self, replay_value):
if self.is_live:
value = str(uuid.uuid4())
self.scrubber.register_name_pair(value, replay_value)
return value
return replay_value
def get_service_principal_id(self):
replay_value = "service-principal-id"
if self.is_live:
value = os.environ["AZURE_CLIENT_ID"]
self.scrubber.register_name_pair(value, replay_value)
return value
return replay_value
@ResourceGroupPreparer(random_name_enabled=True)
@KeyVaultPreparer()
@AccessControlClientPreparer()
def test_list_role_definitions(self, client):
definitions = [d for d in client.list_role_definitions(KeyVaultRoleScope.global_value)]
assert len(definitions)
for definition in definitions:
assert "/" in definition.assignable_scopes
assert definition.description is not None
assert definition.id is not None
assert definition.name is not None
assert len(definition.permissions)
assert definition.role_name is not None
assert definition.role_type is not None
assert definition.type is not None
@ResourceGroupPreparer(random_name_enabled=True)
@KeyVaultPreparer()
@AccessControlClientPreparer()
def test_role_assignment(self, client):
scope = KeyVaultRoleScope.global_value
definitions = [d for d in client.list_role_definitions(scope)]
# assign an arbitrary role to the service principal authenticating these requests
definition = definitions[0]
principal_id = self.get_service_principal_id()
name = self.get_replayable_uuid("some-uuid")
created = client.create_role_assignment(scope, definition.id, principal_id, role_assignment_name=name)
assert created.name == name
assert created.principal_id == principal_id
assert created.role_definition_id == definition.id
assert created.scope == scope
# should be able to get the new assignment
got = client.get_role_assignment(scope, name)
assert got.name == name
assert got.principal_id == principal_id
assert got.role_definition_id == definition.id
assert got.scope == scope
# new assignment should be in the list of all assignments
matching_assignments = [
a for a in client.list_role_assignments(scope) if a.assignment_id == created.assignment_id
]
assert len(matching_assignments) == 1
# delete the assignment
deleted = client.delete_role_assignment(scope, created.name)
assert deleted.name == created.name
assert deleted.assignment_id == created.assignment_id
assert deleted.scope == scope
assert deleted.role_definition_id == created.role_definition_id
assert not any(a for a in client.list_role_assignments(scope) if a.assignment_id == created.assignment_id)
|