Skip to content

Conversation

@shenmuxiaosen
Copy link
Contributor

Description

Testing Guide

History Notes

[Component Name 1] BREAKING CHANGE: az command a: Make some customer-facing breaking change.
[Component Name 2] az command b: Add some customer-facing feature.


This checklist is used to make sure that common guidelines for a pull request are followed.

@shenmuxiaosen
Copy link
Contributor Author

@avanigupta Can you help to look at this pr? Thanks.

@avanigupta
Copy link
Member

Hey @shenmuxiaosen, can you remove the new test recordings since the functionality (service calls) didn't really change in this PR? So we have no reason to update yaml files.
I also noticed that the live scenario tests have a corresponding yaml file now which should not be checked in. Thanks!

@yonzhan
Copy link
Collaborator

yonzhan commented Nov 7, 2020

AppConfig

@shenmuxiaosen
Copy link
Contributor Author

Yeah, we don't need to record for AAD testcase and it is intented to be a LiveScenairoTest. Also there are some credentials in it which failed the build checks. However, I do think we should keep updating recordings for scenariotests as documentated here. Whoever runs the tests should update the latest records regardless of whether they change the underlayer http requests.


In reply to: 723386455 [](ancestors = 723386455)

with self.assertRaisesRegex(CLIError, "Operation returned an invalid status 'Unauthorized'"):
# Before assigning data reader role, read operation should fail with AAD auth.
# The exception really depends on the which identity is used to run this testcase.
with self.assertRaisesRegex(CLIError, "Operation returned an invalid status '(?:Unauthorized|Forbidden)'"):
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There was a bug ( fixed now ) in get_login_credentials() functionality because of which @fengzhou-msft must have gotten Unauthorized error when he updated the test here.

We should always get 'Forbidden' error if the get_login_credentials() functionality returns the correct access token from AAD.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Will fix in a new pr.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants