@@ -8726,6 +8726,7 @@ def test_update_kms_pmk_cmk(self):
87268726 ground_truth_azure_key_vault_kms_7 = self.models.AzureKeyVaultKms(
87278727 enabled=True,
87288728 key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8729+ key_vault_network_access="Public",
87298730 key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
87308731 )
87318732 ground_truth_kube_resource_encryption_profile_7 = self.models.KubernetesResourceObjectEncryptionProfile(
@@ -8788,8 +8789,11 @@ def test_update_kms_pmk_cmk(self):
87888789 dec_mc_9 = dec_9.update_kms_pmk_cmk(mc_9)
87898790
87908791 # should disable existing Azure Key Vault KMS
8791- ground_truth_azure_key_vault_kms_9 = self.models.AzureKeyVaultKms()
8792- ground_truth_azure_key_vault_kms_9.enabled = False
8792+ ground_truth_azure_key_vault_kms_9 = self.models.AzureKeyVaultKms(
8793+ enabled=False,
8794+ key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8795+ key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
8796+ )
87938797 ground_truth_kube_resource_encryption_profile_9 = self.models.KubernetesResourceObjectEncryptionProfile(
87948798 infrastructure_encryption="Enabled"
87958799 )
@@ -8827,6 +8831,7 @@ def test_update_kms_pmk_cmk(self):
88278831 ground_truth_azure_key_vault_kms_10 = self.models.AzureKeyVaultKms(
88288832 enabled=True,
88298833 key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8834+ key_vault_network_access="Public",
88308835 key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
88318836 )
88328837 ground_truth_security_profile_10 = self.models.ManagedClusterSecurityProfile(
@@ -8839,7 +8844,7 @@ def test_update_kms_pmk_cmk(self):
88398844 )
88408845 self.assertEqual(dec_mc_10, ground_truth_mc_10)
88418846
8842- # test enabling PMK on cluster with disabled CMK - should clear CMK properties
8847+ # test enabling PMK on cluster with disabled CMK
88438848 dec_11 = AKSPreviewManagedClusterUpdateDecorator(
88448849 self.cmd,
88458850 self.client,
@@ -8853,6 +8858,7 @@ def test_update_kms_pmk_cmk(self):
88538858 azure_key_vault_kms=self.models.AzureKeyVaultKms(
88548859 enabled=False,
88558860 key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8861+ key_vault_network_access="Private",
88568862 key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
88578863 )
88588864 )
@@ -8864,8 +8870,12 @@ def test_update_kms_pmk_cmk(self):
88648870 dec_mc_11 = dec_11.update_kms_pmk_cmk(mc_11)
88658871
88668872 # should clear CMK properties and enable PMK
8867- ground_truth_azure_key_vault_kms_11 = self.models.AzureKeyVaultKms()
8868- ground_truth_azure_key_vault_kms_11.enabled = False
8873+ ground_truth_azure_key_vault_kms_11 = self.models.AzureKeyVaultKms(
8874+ enabled=False,
8875+ key_id="https://test-keyvault.vault.azure.net/keys/test-key",
8876+ key_vault_network_access="Private",
8877+ key_vault_resource_id="/subscriptions/test-sub/resourceGroups/test-rg/providers/Microsoft.KeyVault/vaults/test-keyvault",
8878+ )
88698879 ground_truth_kube_resource_encryption_profile_11 = self.models.KubernetesResourceObjectEncryptionProfile(
88708880 infrastructure_encryption="Enabled"
88718881 )
0 commit comments