Skip to content

Commit 607bd49

Browse files
committed
Apply feedback from keys library
1 parent e380034 commit 607bd49

File tree

4 files changed

+38
-44
lines changed

4 files changed

+38
-44
lines changed

sdk/keyvault/azure-keyvault-secrets/azure/keyvault/secrets/_parse_id.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
def parse_key_vault_secret_id(source_id):
1010
# type: (str) -> KeyVaultResourceId
1111
"""Parses a secret's full ID into a class with parsed contents as attributes.
12+
1213
:param str source_id: the full original identifier of a secret
1314
:returns: Returns a parsed secret ID as a :class:`KeyVaultResourceId`
1415
:rtype: ~azure.keyvault.secrets.KeyVaultResourceId

sdk/keyvault/azure-keyvault-secrets/azure/keyvault/secrets/_shared/__init__.py

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,12 @@
2929

3030
class KeyVaultResourceId():
3131
"""Represents a Key Vault identifier and its parsed contents.
32-
:param str source_id: The complete identifier received from Key Vault
33-
:param str vault_url: The vault URL
34-
:param str name: The name extracted from the ID
35-
:param str version: The version extracted from the ID
36-
"""
32+
33+
:param str source_id: The complete identifier received from Key Vault
34+
:param str vault_url: The vault URL
35+
:param str name: The name extracted from the ID
36+
:param str version: The version extracted from the ID
37+
"""
3738

3839
def __init__(
3940
self,

sdk/keyvault/azure-keyvault-secrets/tests/recordings/test_parse_id.test_parse_secret_id_with_version.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ interactions:
2828
content-type:
2929
- application/json; charset=utf-8
3030
date:
31-
- Fri, 06 Nov 2020 01:59:17 GMT
31+
- Fri, 06 Nov 2020 23:51:37 GMT
3232
expires:
3333
- '-1'
3434
pragma:
@@ -70,7 +70,7 @@ interactions:
7070
uri: https://vaultname.vault.azure.net/secrets/secretce671360?api-version=7.1
7171
response:
7272
body:
73-
string: '{"value":"secret_value","id":"https://vaultname.vault.azure.net/secrets/secretce671360/82b4c68fbf654bff953bd26a4a5f5f1e","attributes":{"enabled":true,"created":1604627958,"updated":1604627958,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}'
73+
string: '{"value":"secret_value","id":"https://vaultname.vault.azure.net/secrets/secretce671360/0fb32b11fdbf47eb9973e04a064a5b3f","attributes":{"enabled":true,"created":1604706698,"updated":1604706698,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}'
7474
headers:
7575
cache-control:
7676
- no-cache
@@ -79,7 +79,7 @@ interactions:
7979
content-type:
8080
- application/json; charset=utf-8
8181
date:
82-
- Fri, 06 Nov 2020 01:59:17 GMT
82+
- Fri, 06 Nov 2020 23:51:38 GMT
8383
expires:
8484
- '-1'
8585
pragma:
@@ -114,7 +114,7 @@ interactions:
114114
uri: https://vaultname.vault.azure.net/secrets/secretce671360/?api-version=7.1
115115
response:
116116
body:
117-
string: '{"value":"secret_value","id":"https://vaultname.vault.azure.net/secrets/secretce671360/82b4c68fbf654bff953bd26a4a5f5f1e","attributes":{"enabled":true,"created":1604627958,"updated":1604627958,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}'
117+
string: '{"value":"secret_value","id":"https://vaultname.vault.azure.net/secrets/secretce671360/0fb32b11fdbf47eb9973e04a064a5b3f","attributes":{"enabled":true,"created":1604706698,"updated":1604706698,"recoveryLevel":"Recoverable+Purgeable","recoverableDays":90}}'
118118
headers:
119119
cache-control:
120120
- no-cache
@@ -123,7 +123,7 @@ interactions:
123123
content-type:
124124
- application/json; charset=utf-8
125125
date:
126-
- Fri, 06 Nov 2020 01:59:17 GMT
126+
- Fri, 06 Nov 2020 23:51:38 GMT
127127
expires:
128128
- '-1'
129129
pragma:

sdk/keyvault/azure-keyvault-secrets/tests/test_parse_id.py

Lines changed: 26 additions & 34 deletions
Original file line numberDiff line numberDiff line change
@@ -2,21 +2,17 @@
22
# Copyright (c) Microsoft Corporation.
33
# Licensed under the MIT License.
44
# -------------------------------------
5-
import functools
65
from azure.keyvault.secrets import SecretClient, parse_key_vault_secret_id
76
from devtools_testutils import ResourceGroupPreparer, KeyVaultPreparer
87

9-
from _shared.preparer import KeyVaultClientPreparer as _KeyVaultClientPreparer
8+
from _shared.preparer import KeyVaultClientPreparer
109
from _shared.test_case import KeyVaultTestCase
1110

12-
# pre-apply the client_cls positional argument so it needn't be explicitly passed below
13-
KeyVaultClientPreparer = functools.partial(_KeyVaultClientPreparer, SecretClient)
14-
1511

1612
class TestParseId(KeyVaultTestCase):
1713
@ResourceGroupPreparer(random_name_enabled=True)
1814
@KeyVaultPreparer()
19-
@KeyVaultClientPreparer()
15+
@KeyVaultClientPreparer(SecretClient)
2016
def test_parse_secret_id_with_version(self, client):
2117
secret_name = self.get_resource_name("secret")
2218
secret_value = "secret_value"
@@ -32,31 +28,27 @@ def test_parse_secret_id_with_version(self, client):
3228
print(parsed_secret_id.version)
3329
print(parsed_secret_id.source_id)
3430
# [END parse_key_vault_secret_id]
35-
self.assertEqual(parsed_secret_id.name, secret_name)
36-
self.assertEqual(parsed_secret_id.vault_url, client.vault_url)
37-
self.assertEqual(parsed_secret_id.version, secret.properties.version)
38-
self.assertEqual(parsed_secret_id.source_id, secret.id)
39-
40-
def test_parse_secret_id_with_pending_version(self):
41-
source_id = "https://keyvault-name.vault.azure.net/secrets/secret-name/pending"
42-
parsed_secret_id = parse_key_vault_secret_id(source_id)
43-
44-
self.assertEqual(parsed_secret_id.name, "secret-name")
45-
self.assertEqual(parsed_secret_id.vault_url, "https://keyvault-name.vault.azure.net")
46-
self.assertEqual(parsed_secret_id.version, "pending")
47-
self.assertEqual(
48-
parsed_secret_id.source_id,
49-
"https://keyvault-name.vault.azure.net/secrets/secret-name/pending",
50-
)
51-
52-
def test_parse_deleted_secret_id(self):
53-
source_id = "https://keyvault-name.vault.azure.net/deletedsecrets/deleted-secret"
54-
parsed_secret_id = parse_key_vault_secret_id(source_id)
55-
56-
self.assertEqual(parsed_secret_id.name, "deleted-secret")
57-
self.assertEqual(parsed_secret_id.vault_url, "https://keyvault-name.vault.azure.net")
58-
self.assertIsNone(parsed_secret_id.version)
59-
self.assertEqual(
60-
parsed_secret_id.source_id,
61-
"https://keyvault-name.vault.azure.net/deletedsecrets/deleted-secret",
62-
)
31+
assert parsed_secret_id.name == secret_name
32+
assert parsed_secret_id.vault_url == client.vault_url
33+
assert parsed_secret_id.version == secret.properties.version
34+
assert parsed_secret_id.source_id == secret.id
35+
36+
37+
def test_parse_secret_id_with_pending_version():
38+
source_id = "https://keyvault-name.vault.azure.net/secrets/secret-name/pending"
39+
parsed_secret_id = parse_key_vault_secret_id(source_id)
40+
41+
assert parsed_secret_id.name == "secret-name"
42+
assert parsed_secret_id.vault_url == "https://keyvault-name.vault.azure.net"
43+
assert parsed_secret_id.version == "pending"
44+
assert parsed_secret_id.source_id == "https://keyvault-name.vault.azure.net/secrets/secret-name/pending"
45+
46+
47+
def test_parse_deleted_secret_id():
48+
source_id = "https://keyvault-name.vault.azure.net/deletedsecrets/deleted-secret"
49+
parsed_secret_id = parse_key_vault_secret_id(source_id)
50+
51+
assert parsed_secret_id.name == "deleted-secret"
52+
assert parsed_secret_id.vault_url == "https://keyvault-name.vault.azure.net"
53+
assert parsed_secret_id.version is None
54+
assert parsed_secret_id.source_id == "https://keyvault-name.vault.azure.net/deletedsecrets/deleted-secret"

0 commit comments

Comments
 (0)