-
Notifications
You must be signed in to change notification settings - Fork 2.9k
/
Copy pathenvvariable_loader.py
155 lines (134 loc) · 6.79 KB
/
envvariable_loader.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
# --------------------------------------------------------------------------
# Copyright (c) Microsoft Corporation. All rights reserved.
# Licensed under the MIT License. See License.txt in the project root for
# license information.
# --------------------------------------------------------------------------
import logging
import os
from dotenv import load_dotenv, find_dotenv
from . import AzureMgmtPreparer
from .exceptions import AzureTestError
from .sanitizers import add_general_string_sanitizer
_logger = logging.getLogger(__name__)
class EnvironmentVariableLoader(AzureMgmtPreparer):
def __init__(
self,
directory,
name_prefix="",
disable_recording=True,
client_kwargs=None,
random_name_enabled=False,
use_cache=True,
preparers=None,
**kwargs,
):
super(EnvironmentVariableLoader, self).__init__(
name_prefix,
24,
disable_recording=disable_recording,
client_kwargs=client_kwargs,
random_name_enabled=random_name_enabled,
)
self.directory = directory
self.fake_values = {}
self.real_values = {}
self._set_secrets(**kwargs)
self._backup_preparers = preparers
def _set_secrets(self, **kwargs):
keys = kwargs.keys()
needed_keys = []
for key in keys:
if self.directory in key:
needed_keys.append(key)
self.fake_values[key] = kwargs[key]
for key in self.fake_values:
kwargs.pop(key)
self.needed_keys = needed_keys
def _set_mgmt_settings_real_values(self):
if self.is_live:
tenant = os.environ.get(f"{self.directory.upper()}_TENANT_ID")
client = os.environ.get(f"{self.directory.upper()}_CLIENT_ID")
secret = os.environ.get(f"{self.directory.upper()}_CLIENT_SECRET")
# If environment variables are not all set, check if user-based authentication is requested
if not all(x is not None for x in [tenant, client, secret]):
use_pwsh = os.environ.get("AZURE_TEST_USE_PWSH_AUTH", "false").lower()
use_cli = os.environ.get("AZURE_TEST_USE_CLI_AUTH", "false").lower()
use_vscode = os.environ.get("AZURE_TEST_USE_VSCODE_AUTH", "false").lower()
use_azd = os.environ.get("AZURE_TEST_USE_AZD_AUTH", "false").lower()
user_auth = use_pwsh == "true" or use_cli == "true" or use_vscode == "true" or use_azd == "true"
if not user_auth:
# All variables are required for service principal authentication
_logger.warn(
"Environment variables for service principal credentials are not all set. "
"Please either set the variables or request user-based authentication by setting "
"an 'AZURE_TEST_USE_X_AUTH' environment variable to 'true'. See "
"https://github.com/Azure/azure-sdk-for-python/blob/main/doc/dev/tests.md#configure-test-variables "
"for more information."
)
_logger.debug(
"Environment variables for service principal credentials are not all set but user-based "
f"authentication was requested. Updating 'AZURE_*' variables to match '{self.directory.upper()}_*'."
)
# Set environment vars to directory values (and unset vars if directory vars are missing)
if tenant is not None:
os.environ["AZURE_TENANT_ID"] = tenant
else:
os.environ.pop("AZURE_TENANT_ID", None)
if client is not None:
os.environ["AZURE_CLIENT_ID"] = client
else:
os.environ.pop("AZURE_CLIENT_ID", None)
if secret is not None:
os.environ["AZURE_CLIENT_SECRET"] = secret
else:
os.environ.pop("AZURE_CLIENT_SECRET", None)
def create_resource(self, name, **kwargs):
load_dotenv(find_dotenv())
if self.is_live:
self._set_mgmt_settings_real_values()
try:
for key in self.needed_keys:
scrubbed_value = self.fake_values[key]
if scrubbed_value:
self.real_values[key.lower()] = os.environ[key.upper()]
# vcrpy-based tests have a scrubber to register fake values
if hasattr(self.test_class_instance, "scrubber"):
self.test_class_instance.scrubber.register_name_pair(
self.real_values[key.lower()], scrubbed_value
)
# test proxy tests have no scrubber, and instead register sanitizers using fake values
else:
try:
add_general_string_sanitizer(
value=scrubbed_value,
target=self.real_values[key.lower()],
)
except:
_logger.info(
"This test class instance has no scrubber and a sanitizer could not be registered "
"with the test proxy, so the EnvironmentVariableLoader will not scrub the value of "
f"{key} in recordings."
)
else:
raise AzureTestError(
"To pass a live ID you must provide the scrubbed value for recordings to prevent secrets "
f"from being written to files. {key} was not given. For example: "
'@EnvironmentVariableLoader("schemaregistry", '
'schemaregistry_endpoint="fake_endpoint.servicebus.windows.net")'
)
except KeyError as key_error:
if not self._backup_preparers:
raise
self.real_values = {}
create_kwargs = {}
for preparer in self._backup_preparers:
resource_name, values = preparer._prepare_create_resource(self.test_class_instance, **create_kwargs)
# values = preparer.create_resource(name, **create_kwargs)
self.real_values.update(values)
if "resource_group" in self.real_values.keys():
create_kwargs["resource_group"] = self.real_values["resource_group"]
return self.real_values
else:
return self.fake_values
def remove_resource(self, name, **kwargs):
pass