|
1 | | -import pytest |
2 | | - |
3 | | -from delinea.secrets.server import ( |
4 | | - AccessTokenAuthorizer, |
5 | | - SecretServer, |
6 | | - SecretServerClientError, |
7 | | - SecretServerError, |
8 | | - ServerSecret, |
9 | | -) |
10 | | - |
11 | | - |
12 | | -def test_bad_url(env_vars, authorizer): |
13 | | - bad_server = SecretServer( |
14 | | - f"https://{env_vars['tenant']}.secretservercloud.com/nonexistent", |
15 | | - authorizer, |
16 | | - ) |
17 | | - with pytest.raises(SecretServerError): |
18 | | - bad_server.get_secret(env_vars["secret_id"]) |
19 | | - |
20 | | - |
21 | | -def test_token_url(env_vars, authorizer): |
22 | | - assert ( |
23 | | - authorizer.token_url |
24 | | - == f"https://{env_vars['tenant']}.secretservercloud.com/oauth2/token" |
25 | | - ) |
26 | | - |
27 | | - |
28 | | -def test_api_url(secret_server, env_vars): |
29 | | - assert ( |
30 | | - secret_server.api_url |
31 | | - == f"https://{env_vars['tenant']}.secretservercloud.com/api/v1" |
32 | | - ) |
33 | | - |
34 | | - |
35 | | -def test_access_token_authorizer(env_vars, authorizer): |
36 | | - assert SecretServer( |
37 | | - f"https://{env_vars['tenant']}.secretservercloud.com/", |
38 | | - AccessTokenAuthorizer(authorizer.get_access_token()), |
39 | | - ).get_secret(env_vars["secret_id"])["id"] == int(env_vars["secret_id"]) |
40 | | - |
41 | | - |
42 | | -def test_server_secret(env_vars, secret_server): |
43 | | - assert ServerSecret(**secret_server.get_secret(env_vars["secret_id"])).id == int( |
44 | | - env_vars["secret_id"] |
45 | | - ) |
46 | | - |
47 | | - |
48 | | -def test_server_secret_by_path(env_vars, secret_server): |
49 | | - assert ServerSecret( |
50 | | - **secret_server.get_secret_by_path(env_vars["secret_path"]) |
51 | | - ).id == int(env_vars["secret_id"]) |
52 | | - |
53 | | - |
54 | | -def test_nonexistent_secret(secret_server): |
55 | | - with pytest.raises(SecretServerClientError): |
56 | | - secret_server.get_secret(1000) |
| 1 | +import pytest |
| 2 | + |
| 3 | +from delinea.secrets.server import ( |
| 4 | + AccessTokenAuthorizer, |
| 5 | + SecretServer, |
| 6 | + SecretServerClientError, |
| 7 | + SecretServerError, |
| 8 | + ServerSecret, |
| 9 | +) |
| 10 | + |
| 11 | + |
| 12 | +def test_bad_url(env_vars, authorizer): |
| 13 | + bad_server = SecretServer( |
| 14 | + f"https://{env_vars['tenant']}.secretservercloud.com/nonexistent", |
| 15 | + authorizer, |
| 16 | + ) |
| 17 | + with pytest.raises(SecretServerError): |
| 18 | + bad_server.get_secret(env_vars["secret_id"]) |
| 19 | + |
| 20 | + |
| 21 | +def test_token_url(env_vars, authorizer): |
| 22 | + assert ( |
| 23 | + authorizer.token_url |
| 24 | + == f"https://{env_vars['tenant']}.secretservercloud.com/oauth2/token" |
| 25 | + ) |
| 26 | + |
| 27 | + |
| 28 | +def test_api_url(secret_server, env_vars): |
| 29 | + assert ( |
| 30 | + secret_server.api_url |
| 31 | + == f"https://{env_vars['tenant']}.secretservercloud.com/api/v1" |
| 32 | + ) |
| 33 | + |
| 34 | + |
| 35 | +def test_access_token_authorizer(env_vars, authorizer): |
| 36 | + assert SecretServer( |
| 37 | + f"https://{env_vars['tenant']}.secretservercloud.com/", |
| 38 | + AccessTokenAuthorizer(authorizer.get_access_token()), |
| 39 | + ).get_secret(env_vars["secret_id"])["id"] == int(env_vars["secret_id"]) |
| 40 | + |
| 41 | + |
| 42 | +def test_server_secret(env_vars, secret_server): |
| 43 | + assert ServerSecret(**secret_server.get_secret(env_vars["secret_id"])).id == int( |
| 44 | + env_vars["secret_id"] |
| 45 | + ) |
| 46 | + |
| 47 | + |
| 48 | +def test_server_secret_by_path(env_vars, secret_server): |
| 49 | + assert ServerSecret( |
| 50 | + **secret_server.get_secret_by_path("/tss-sdk-go/Amazon") |
| 51 | + ).id == int(env_vars["secret_id"]) |
| 52 | + |
| 53 | + |
| 54 | +def test_nonexistent_secret(secret_server): |
| 55 | + with pytest.raises(SecretServerClientError): |
| 56 | + secret_server.get_secret(1000) |
0 commit comments