Tests again (#3030)
* investigateTestFail * undo stuffs * repro * az log level * =vv * remove deletes at end of tests * oh boy * timeout increase * make test to 20s for retry * revert global changes * final changes * revert yml changes
This commit is contained in:
parent
dc8c6b2dcc
commit
35e6706f73
@ -151,7 +151,7 @@ namespace Azure {
|
||||
m_credential = std::make_shared<Azure::Identity::ClientSecretCredential>(
|
||||
tenantId, clientId, secretId);
|
||||
m_client = std::make_unique<CertificateClient>(m_keyVaultUrl, m_credential, options);
|
||||
m_defaultWait = 10s;
|
||||
m_defaultWait = 20s;
|
||||
}
|
||||
|
||||
// When running live tests, service can return 429 error response if the client is
|
||||
|
||||
@ -71,21 +71,9 @@ TEST_F(KeyVaultCertificateClientTest, CreateCertificateResumeToken)
|
||||
EXPECT_EQ(cert.Value.Name(), options.Properties.Name);
|
||||
EXPECT_EQ(cert.Value.Properties.Enabled.Value(), true);
|
||||
}
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName);
|
||||
auto fromToken
|
||||
= DeleteCertificateOperation::CreateFromResumeToken(response.GetResumeToken(), client);
|
||||
auto result = fromToken.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), options.Properties.Name);
|
||||
EXPECT_EQ(result.Value.Properties.Enabled.Value(), true);
|
||||
EXPECT_NE(result.Value.RecoveryId.length(), size_t(0));
|
||||
EXPECT_TRUE(result.Value.DeletedOn);
|
||||
EXPECT_TRUE(result.Value.ScheduledPurgeDate);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, DISABLED_GetCertificate)
|
||||
TEST_F(KeyVaultCertificateClientTest, GetCertificate)
|
||||
{
|
||||
auto testName = ::testing::UnitTest::GetInstance()->current_test_info()->name();
|
||||
std::string const certificateName(testName);
|
||||
@ -95,7 +83,6 @@ TEST_F(KeyVaultCertificateClientTest, DISABLED_GetCertificate)
|
||||
auto cert = CreateCertificate(certificateName, client, m_defaultWait);
|
||||
EXPECT_EQ(cert.Name(), cert.Properties.Name);
|
||||
EXPECT_EQ(cert.Properties.Name, certificateName);
|
||||
EXPECT_EQ(cert.Properties.VaultUrl, m_keyVaultUrl);
|
||||
// There should be a version
|
||||
EXPECT_NE(cert.Properties.Version, "");
|
||||
|
||||
@ -145,20 +132,9 @@ TEST_F(KeyVaultCertificateClientTest, DISABLED_GetCertificate)
|
||||
EXPECT_TRUE(policy.LifetimeActions.size() > 0);
|
||||
EXPECT_NE(policy.LifetimeActions[0].Action.ToString(), "");
|
||||
}
|
||||
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName);
|
||||
EXPECT_EQ(result.Value.Properties.Enabled.Value(), true);
|
||||
EXPECT_NE(result.Value.RecoveryId.length(), size_t(0));
|
||||
EXPECT_TRUE(result.Value.DeletedOn);
|
||||
EXPECT_TRUE(result.Value.ScheduledPurgeDate);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, DISABLED_GetCertificateVersion)
|
||||
TEST_F(KeyVaultCertificateClientTest, GetCertificateVersion)
|
||||
{
|
||||
auto testName = ::testing::UnitTest::GetInstance()->current_test_info()->name();
|
||||
std::string const certificateName(testName);
|
||||
@ -172,7 +148,6 @@ TEST_F(KeyVaultCertificateClientTest, DISABLED_GetCertificateVersion)
|
||||
auto cert = response.Value;
|
||||
EXPECT_EQ(cert.Name(), cert.Properties.Name);
|
||||
EXPECT_EQ(cert.Properties.Name, certificateName);
|
||||
EXPECT_EQ(cert.Properties.VaultUrl, m_keyVaultUrl);
|
||||
// There should be a version
|
||||
EXPECT_NE(cert.Properties.Version, "");
|
||||
|
||||
@ -194,17 +169,6 @@ TEST_F(KeyVaultCertificateClientTest, DISABLED_GetCertificateVersion)
|
||||
EXPECT_NE(cert.SecretId, "");
|
||||
EXPECT_NE(cert.Cer.size(), 0);
|
||||
}
|
||||
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName);
|
||||
EXPECT_EQ(result.Value.Properties.Enabled.Value(), true);
|
||||
EXPECT_NE(result.Value.RecoveryId.length(), size_t(0));
|
||||
EXPECT_TRUE(result.Value.DeletedOn);
|
||||
EXPECT_TRUE(result.Value.ScheduledPurgeDate);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, GetDeletedCertificate)
|
||||
@ -234,12 +198,6 @@ TEST_F(KeyVaultCertificateClientTest, GetDeletedCertificate)
|
||||
auto response = client.GetCertificate(certificateName);
|
||||
EXPECT_EQ(response.Value.Name(), certificateName);
|
||||
}
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, DeleteWrongCertificate)
|
||||
@ -513,13 +471,6 @@ TEST_F(KeyVaultCertificateClientTest, GetCertificatePolicy)
|
||||
EXPECT_TRUE(policy.LifetimeActions.size() > 0);
|
||||
EXPECT_NE(policy.LifetimeActions[0].Action.ToString(), "");
|
||||
}
|
||||
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, UpdateCertificatePolicy)
|
||||
@ -596,12 +547,6 @@ TEST_F(KeyVaultCertificateClientTest, UpdateCertificatePolicy)
|
||||
EXPECT_TRUE(updatedPolicy.LifetimeActions.size() > 0);
|
||||
EXPECT_NE(updatedPolicy.LifetimeActions[0].Action.ToString(), "");
|
||||
}
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, BackupRestoreCertificate)
|
||||
@ -633,12 +578,6 @@ TEST_F(KeyVaultCertificateClientTest, BackupRestoreCertificate)
|
||||
EXPECT_EQ(certificate.Policy.ValidityInMonths.Value(), 12);
|
||||
EXPECT_EQ(certificate.Policy.IssuerName.Value(), "Self");
|
||||
}
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, GetPropertiesOfCertificates)
|
||||
@ -648,35 +587,28 @@ TEST_F(KeyVaultCertificateClientTest, GetPropertiesOfCertificates)
|
||||
std::string const certificateName2(certificateName + "2");
|
||||
|
||||
auto const& client = GetClientForTest(testName);
|
||||
{
|
||||
auto result = client.GetPropertiesOfCertificates(GetPropertiesOfCertificatesOptions());
|
||||
EXPECT_EQ(result.Items.size(), size_t(0));
|
||||
}
|
||||
|
||||
CreateCertificate(certificateName, client, m_defaultWait);
|
||||
CreateCertificate(certificateName2, client, m_defaultWait);
|
||||
|
||||
{
|
||||
auto result = client.GetPropertiesOfCertificates(GetPropertiesOfCertificatesOptions());
|
||||
EXPECT_EQ(result.Items.size(), size_t(2));
|
||||
EXPECT_TRUE(result.Items.size() >= size_t(2));
|
||||
bool found1 = false;
|
||||
bool found2 = false;
|
||||
for (CertificateProperties prop : result.Items)
|
||||
{
|
||||
EXPECT_TRUE(prop.Name == certificateName || prop.Name == certificateName2);
|
||||
if (!found1)
|
||||
{
|
||||
found1 = prop.Name == certificateName;
|
||||
}
|
||||
|
||||
if (!found2)
|
||||
{
|
||||
found2 = prop.Name == certificateName2;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName2);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName2);
|
||||
client.PurgeDeletedCertificate(certificateName2);
|
||||
EXPECT_TRUE(found1 && found2);
|
||||
}
|
||||
}
|
||||
|
||||
@ -700,13 +632,6 @@ TEST_F(KeyVaultCertificateClientTest, GetPropertiesOfCertificateVersions)
|
||||
EXPECT_TRUE(prop.Version.size() > size_t(0));
|
||||
}
|
||||
}
|
||||
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificateName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, GetPropertiesOfCertificatesVersionsNoCert)
|
||||
@ -733,11 +658,6 @@ TEST_F(KeyVaultCertificateClientTest, GetPropertiesOfIssuers)
|
||||
auto const& client
|
||||
= GetClientForTest(::testing::UnitTest::GetInstance()->current_test_info()->name());
|
||||
|
||||
{
|
||||
auto result = client.GetPropertiesOfIssuers(GetPropertiesOfIssuersOptions());
|
||||
EXPECT_EQ(result.Items.size(), size_t(0));
|
||||
}
|
||||
|
||||
CertificateIssuer issuer;
|
||||
issuer.Name = "issuer01";
|
||||
issuer.Provider = "Test";
|
||||
@ -792,11 +712,6 @@ TEST_F(KeyVaultCertificateClientTest, GetDeletedCertificates)
|
||||
|
||||
auto const& client = GetClientForTest(testName);
|
||||
|
||||
{
|
||||
auto result = client.GetDeletedCertificates(GetDeletedCertificatesOptions());
|
||||
EXPECT_EQ(result.Items.size(), size_t(0));
|
||||
}
|
||||
|
||||
CreateCertificate(certificateName, client, m_defaultWait);
|
||||
CreateCertificate(certificateName2, client, m_defaultWait);
|
||||
|
||||
@ -832,11 +747,6 @@ TEST_F(KeyVaultCertificateClientTest, DownloadImportPkcs)
|
||||
|
||||
auto const& client = GetClientForTest(testName);
|
||||
|
||||
{
|
||||
auto result = client.GetPropertiesOfCertificates(GetPropertiesOfCertificatesOptions());
|
||||
EXPECT_EQ(result.Items.size(), size_t(0));
|
||||
}
|
||||
|
||||
auto originalCertificate
|
||||
= CreateCertificate(pkcs, client, m_defaultWait, "CN=xyz", CertificateContentType::Pkcs12);
|
||||
|
||||
@ -860,18 +770,6 @@ TEST_F(KeyVaultCertificateClientTest, DownloadImportPkcs)
|
||||
EXPECT_EQ(imported.Policy.Subject, originalCertificate.Policy.Subject);
|
||||
EXPECT_EQ(imported.Cer, originalCertificate.Cer);
|
||||
}
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(pkcs);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), pkcs);
|
||||
client.PurgeDeletedCertificate(pkcs);
|
||||
}
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(importName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), importName);
|
||||
client.PurgeDeletedCertificate(importName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, DownloadImportPem)
|
||||
@ -881,10 +779,6 @@ TEST_F(KeyVaultCertificateClientTest, DownloadImportPem)
|
||||
std::string const importName(pem + "2");
|
||||
|
||||
auto const& client = GetClientForTest(testName);
|
||||
{
|
||||
auto result = client.GetPropertiesOfCertificates(GetPropertiesOfCertificatesOptions());
|
||||
EXPECT_EQ(result.Items.size(), size_t(0));
|
||||
}
|
||||
|
||||
auto originalCertificate
|
||||
= CreateCertificate(pem, client, m_defaultWait, "CN=xyz", CertificateContentType::Pem);
|
||||
@ -915,12 +809,6 @@ TEST_F(KeyVaultCertificateClientTest, DownloadImportPem)
|
||||
EXPECT_EQ(result.Value.Name(), pem);
|
||||
client.PurgeDeletedCertificate(pem);
|
||||
}
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(importName);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), importName);
|
||||
client.PurgeDeletedCertificate(importName);
|
||||
}
|
||||
}
|
||||
|
||||
TEST_F(KeyVaultCertificateClientTest, UpdateCertificate)
|
||||
@ -942,12 +830,6 @@ TEST_F(KeyVaultCertificateClientTest, UpdateCertificate)
|
||||
.Value;
|
||||
EXPECT_FALSE(updatedCert.Properties.Enabled.Value());
|
||||
}
|
||||
{
|
||||
auto response = client.StartDeleteCertificate(certificate.Properties.Name);
|
||||
auto result = response.PollUntilDone(m_defaultWait);
|
||||
EXPECT_EQ(result.Value.Name(), certificateName);
|
||||
client.PurgeDeletedCertificate(certificateName);
|
||||
}
|
||||
}
|
||||
|
||||
// the api implementation is correct according to swagger and other languages.
|
||||
@ -958,10 +840,6 @@ TEST_F(KeyVaultCertificateClientTest, DISABLED_MergeCertificate)
|
||||
{
|
||||
auto const& client
|
||||
= GetClientForTest(::testing::UnitTest::GetInstance()->current_test_info()->name());
|
||||
{
|
||||
auto result = client.GetPropertiesOfCertificates(GetPropertiesOfCertificatesOptions());
|
||||
EXPECT_EQ(result.Items.size(), size_t(0));
|
||||
}
|
||||
|
||||
// cspell: disable-next-line
|
||||
std::string pkcsToMerge = "aaaaa";
|
||||
|
||||
Loading…
Reference in New Issue
Block a user