Skip to content

Conversation

@MouhsinElmajdouby
Copy link
Member

@MouhsinElmajdouby MouhsinElmajdouby commented Jun 16, 2025

Fixes: #193

Reject URLs ending in /secrets/ with no name by validating in AzureVaultURLParser and throwing a clear IllegalArgumentException.
Added a unit test to cover the empty‐name scenario.

@oracle-contributor-agreement oracle-contributor-agreement bot added the OCA Verified All contributors have signed the Oracle Contributor Agreement. label Jun 16, 2025
if (!path.contains("/secrets"))
if (!path.contains("/secrets/"))
throw new IllegalArgumentException("The Vault Secret URI should " +
"contain \"/secrets\" following by the name of the Secret: " +
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

contain "/secrets" followed by the name of the Secret:

@jeandelavarene jeandelavarene merged commit b12a688 into main Jul 2, 2025
2 checks passed
@jeandelavarene jeandelavarene deleted the bugfix/azure-vault-config-empty-secret-name-validation branch July 2, 2025 15:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

OCA Verified All contributors have signed the Oracle Contributor Agreement.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[AZURE VAULT CONFIG PROVIDER] IF VAULT SECRET NAME IS EMPTY, THE EXCEPTION IS NOT USEFUL

3 participants