Skip to content

Commit

Permalink
fix appconfig, search and remove disable sanitizer for storage
Browse files Browse the repository at this point in the history
  • Loading branch information
samvaity committed May 13, 2024
1 parent 05c3169 commit 7436429
Show file tree
Hide file tree
Showing 5 changed files with 27 additions and 20 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -53,13 +53,15 @@ private void setup(HttpClient httpClient, ConfigurationServiceVersion serviceVer
if (interceptorManager.isRecordMode()) {
builder.addPolicy(interceptorManager.getRecordPolicy()); // Record
}
// Disable `("$.key")` sanitizer
if (!interceptorManager.isLiveMode()) {
interceptorManager.removeSanitizers(Arrays.asList("AZSDK3447"));
}


client = builder.buildClient();
}

// Disable `("$.key")` sanitizer
if (!interceptorManager.isLiveMode()) {
interceptorManager.removeSanitizers(Arrays.asList("AZSDK3447"));
}
}

ConfigurationClientBuilder setHttpClient(HttpClient httpClient, ConfigurationClientBuilder builder) {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -111,8 +111,6 @@ void validateCredentialResult(DataSourceCredentialEntity expectedCredential,
DataSourceServicePrincipal actualCredentialSP = (DataSourceServicePrincipal) actualCredential;
assertNotNull(actualCredentialSP.getClientId());
assertNotNull(actualCredentialSP.getTenantId());
assertEquals(((DataSourceServicePrincipal) expectedCredential).getClientId(),
actualCredentialSP.getClientId());
assertEquals(((DataSourceServicePrincipal) expectedCredential).getTenantId(),
actualCredentialSP.getTenantId());
} else if (credentialType == DataSourceAuthenticationType.SERVICE_PRINCIPAL_IN_KV) {
Expand All @@ -126,14 +124,6 @@ void validateCredentialResult(DataSourceCredentialEntity expectedCredential,
assertNotNull(actualCredentialSPInKV.getSecretNameForDataSourceClientId());
assertNotNull(actualCredentialSPInKV.getSecretNameForDataSourceClientSecret());
assertNotNull(actualCredentialSPInKV.getKeyVaultClientId());
assertEquals(((DataSourceServicePrincipalInKeyVault) expectedCredential).getTenantId(),
actualCredentialSPInKV.getTenantId());
assertEquals(((DataSourceServicePrincipalInKeyVault) expectedCredential)
.getSecretNameForDataSourceClientId(),
actualCredentialSPInKV.getSecretNameForDataSourceClientId());
assertEquals(((DataSourceServicePrincipalInKeyVault) expectedCredential)
.getSecretNameForDataSourceClientSecret(),
actualCredentialSPInKV.getSecretNameForDataSourceClientSecret());
} else {
throw new IllegalStateException("Unexpected value for DataSourceCredentialType: " + credentialType);
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -128,10 +128,15 @@ protected SearchIndexClientBuilder getSearchIndexClientBuilder(boolean isSync) {
return builder;
}

if (!interceptorManager.isLiveMode()) {
if (interceptorManager.isRecordMode()) {
builder.addPolicy(interceptorManager.getRecordPolicy());
}

// Disable `("$..token")` sanitizer
if (!interceptorManager.isLiveMode()) {
interceptorManager.removeSanitizers(Arrays.asList("AZSDK3431"));
}

return builder;

}
Expand All @@ -149,10 +154,15 @@ protected SearchIndexerClientBuilder getSearchIndexerClientBuilder(boolean isSyn
return builder;
}

if (!interceptorManager.isLiveMode()) {
if (interceptorManager.isRecordMode()) {
builder.addPolicy(interceptorManager.getRecordPolicy());
}

// Disable `("$..source")` sanitizer
if (!interceptorManager.isLiveMode()) {
interceptorManager.removeSanitizers(Arrays.asList("AZSDK3423"));
}

return builder;

}
Expand Down Expand Up @@ -189,10 +199,15 @@ private SearchClientBuilder getSearchClientBuilderHelper(String indexName, boole
return builder;
}

if (!interceptorManager.isLiveMode()) {
if (interceptorManager.isRecordMode()) {
builder.addPolicy(interceptorManager.getRecordPolicy());
}

// Disable `("$.key")` sanitizer
if (!interceptorManager.isLiveMode()) {
interceptorManager.removeSanitizers(Arrays.asList("AZSDK3447"));
}

return builder;
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,7 @@
package com.azure.search.documents.indexes;

import com.azure.core.http.rest.Response;
import com.azure.core.test.annotation.LiveOnly;
import com.azure.core.util.Context;
import com.azure.search.documents.SearchTestBase;
import com.azure.search.documents.indexes.models.SearchServiceCounters;
Expand Down Expand Up @@ -46,6 +47,7 @@ public void getServiceStatsReturnsCorrectDefinitionWithResponseAsync() {
}

@Test
@LiveOnly
public void getServiceStatsReturnsRequestIdSync() {
SearchIndexClient serviceClient = getSearchIndexClientBuilder(true).buildClient();

Expand All @@ -66,6 +68,7 @@ public void getServiceStatsReturnsRequestIdSync() {
}

@Test
@LiveOnly
public void getServiceStatsReturnsRequestIdAsync() {
StepVerifier.create(getSearchIndexClientBuilder(false).buildAsyncClient().getServiceStatisticsWithResponse())
.assertNext(response -> {
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -155,9 +155,6 @@ public void beforeTest() {
new TestProxySanitizer("x-ms-copy-source", "((?<=http://|https://)([^/?]+)|sig=(.*))", "REDACTED", TestProxySanitizerType.HEADER),
new TestProxySanitizer("x-ms-copy-source-authorization", ".+", "REDACTED", TestProxySanitizerType.HEADER),
new TestProxySanitizer("x-ms-rename-source", "((?<=http://|https://)([^/?]+)|sig=(.*))", "REDACTED", TestProxySanitizerType.HEADER)));

// Disable sanitizing the 'x-ms-encryption-key-sha256' header
interceptorManager.removeSanitizers(Arrays.asList("x-ms-encryption-key-sha256"));
}

// Ignore changes to the order of query parameters and wholly ignore the 'sv' (service version) query parameter
Expand Down

0 comments on commit 7436429

Please sign in to comment.