-
Notifications
You must be signed in to change notification settings - Fork 2.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
adding a proxy setup to base conftest. just need to disable it when p… #25532
Conversation
…roxy isn't enabled.
Hmm, I'll have to think about it. If it's something we'd want to be done whenever the test proxy is invoked, it might make sense to add it to the test proxy startup since I'm not sure if it otherwise has significantly more value in The main issue with this, I would think, is that most tests aren't using |
Dead on. BUT we could absolutely add these by default. Try to set up a few base ones that always get removed if not using PowerShellPreparer, etc. Your suggestion to move this into the test proxy startup is well taken. I'll make that code change here. |
This pull request is protected by Check Enforcer. What is Check Enforcer?Check Enforcer helps ensure all pull requests are covered by at least one check-run (typically an Azure Pipeline). When all check-runs associated with this pull request pass then Check Enforcer itself will pass. Why am I getting this message?You are getting this message because Check Enforcer did not detect any check-runs being associated with this pull request within five minutes. This may indicate that your pull request is not covered by any pipelines and so Check Enforcer is correctly blocking the pull request being merged. What should I do now?If the check-enforcer check-run is not passing and all other check-runs associated with this PR are passing (excluding license-cla) then you could try telling Check Enforcer to evaluate your pull request again. You can do this by adding a comment to this pull request as follows: What if I am onboarding a new service?Often, new services do not have validation pipelines associated with them, in order to bootstrap pipelines for a new service, you can issue the following command as a pull request comment: |
…et during startup.
@@ -597,6 +598,15 @@ def _send_reset_request(headers: dict) -> None: | |||
) | |||
response.raise_for_status() | |||
|
|||
headers_to_ignore = "Authorization, x-ms-client-request-id, x-ms-request-id" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not certain it's intended. But when we start up the test-proxy, we set a couple default custom items.
Then after reset, we don't actually resend those. I've moved all of the common default to _send_reset
and then just called that during proxy startup.
One place, all the defaults. I could be missing reasoning here though 👍
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Only setting the header rules once was actually intentional, albeit for rare edge cases. There are some teams that need request ID headers for tests, so being able to reset everything to a clean slate seemed like a good solution at the time.
I'd like to do something similar to your suggestion, so that we have a persistent default baseline of things to ignore -- otherwise, "resetting to default" isn't really giving people the default they're expecting.
To solve both those problems, it seems like the solution might be to provide methods for removing headers from this exclusion list 🤔
Hi @scbedd. Thank you for your interest in helping to improve the Azure SDK experience and for your contribution. We've noticed that there hasn't been recent engagement on this pull request. If this is still an active work stream, please let us know by pushing some changes or leaving a comment. Otherwise, we'll close this out in 7 days. |
Hi @scbedd. Thank you for your interest in helping to improve the Azure SDK experience and for your contribution. We've noticed that there hasn't been recent engagement on this pull request. If this is still an active work stream, please let us know by pushing some changes or leaving a comment. Otherwise, we'll close this out in 7 days. |
Resolves #25225, in addition to sanitizing common culprits of credential leaks:
AZURE_X
)SERVICE_X
)