Skip to content

Commit 2597a6b

Browse files
authored
fix uri (Azure#20632)
* fix uri * update * update changelog * udpates
1 parent f4ea90a commit 2597a6b

12 files changed

+51
-40
lines changed

sdk/appconfiguration/azure-appconfiguration/CHANGELOG.md

Lines changed: 10 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,22 @@
11
# Release History
22

3-
## 1.2.1 (Unreleased)
3+
## 1.3.0 (Unreleased)
44

55
### Features Added
66

77
### Breaking Changes
88

99
### Bugs Fixed
1010

11+
- Fix the issue that data was persisted according to an incorrect schema/in an incorrect format ([#20518](https://github.com/Azure/azure-sdk-for-python/issues/20518))
12+
13+
`SecretReferenceConfigurationSetting` in 1.2.0 used "secret_uri" rather than "uri" as the schema keywords which
14+
broken inter-operation of `SecretReferenceConfigurationSetting` between SDK and the portal.
15+
16+
Please:
17+
- Use 1.3.0+ for any `SecretReferenceConfigurationSetting` uses.
18+
- Call a get method for existing `SecretReferenceConfigurationSetting`s and set them back to correct the format.
19+
1120
### Other Changes
1221

1322
## 1.2.0 (2021-07-06)

sdk/appconfiguration/azure-appconfiguration/azure/appconfiguration/_models.py

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -308,13 +308,13 @@ def __init__(self, key, secret_id, **kwargs): # pylint: disable=super-init-not-
308308
self.read_only = kwargs.get("read_only", None)
309309
self.tags = kwargs.get("tags", {})
310310
self.secret_id = secret_id
311-
self._value = json.dumps({"secret_uri": secret_id})
311+
self._value = json.dumps({"uri": secret_id})
312312

313313
@property
314314
def value(self):
315315
try:
316316
temp = json.loads(self._value)
317-
temp["secret_uri"] = self.secret_id
317+
temp["uri"] = self.secret_id
318318
self._value = json.dumps(temp)
319319
return self._value
320320
except (JSONDecodeError, ValueError):
@@ -325,7 +325,7 @@ def value(self, new_value):
325325
try:
326326
temp = json.loads(new_value)
327327
self._value = new_value
328-
self.secret_id = temp.get("secret_uri")
328+
self.secret_id = temp.get("uri")
329329
except(JSONDecodeError, ValueError):
330330
self._value = new_value
331331
self.secret_id = None
@@ -338,7 +338,9 @@ def _from_generated(cls, key_value):
338338
secret_uri = None
339339
try:
340340
temp = json.loads(key_value.value) # type: ignore
341-
secret_uri = temp.get("secret_uri")
341+
secret_uri = temp.get("uri")
342+
if not secret_uri:
343+
secret_uri = temp.get("secret_uri")
342344
except (ValueError, JSONDecodeError):
343345
pass
344346

sdk/appconfiguration/azure-appconfiguration/azure/appconfiguration/_version.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,4 +3,4 @@
33
# Licensed under the MIT License.
44
# ------------------------------------
55

6-
VERSION = "1.2.1"
6+
VERSION = "1.3.0"

sdk/appconfiguration/azure-appconfiguration/tests/recordings/test_azure_configuration_client.test_breaking2.yaml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ interactions:
279279
message: OK
280280
- request:
281281
body: '{"key": "aref", "content_type": "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8",
282-
"value": "{\"secret_uri\": \"notaurl\"}", "tags": {}}'
282+
"value": "{\"uri\": \"notaurl\"}", "tags": {}}'
283283
headers:
284284
Accept:
285285
- application/vnd.microsoft.appconfig.kv+json
@@ -303,7 +303,7 @@ interactions:
303303
uri: https://fake_app_config.azconfig-test.io/kv/aref?api-version=1.0
304304
response:
305305
body:
306-
string: '{"etag":"XV3d02cqdYHZKgNdzki1wVDkyv5","key":"aref","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
306+
string: '{"etag":"XV3d02cqdYHZKgNdzki1wVDkyv5","key":"aref","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
307307
\"notaurl\"}","tags":{},"locked":false,"last_modified":"2021-03-17T16:24:43+00:00"}'
308308
headers:
309309
access-control-allow-credentials:
@@ -359,7 +359,7 @@ interactions:
359359
uri: https://fake_app_config.azconfig-test.io/kv/aref?api-version=1.0
360360
response:
361361
body:
362-
string: '{"etag":"XV3d02cqdYHZKgNdzki1wVDkyv5","key":"aref","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
362+
string: '{"etag":"XV3d02cqdYHZKgNdzki1wVDkyv5","key":"aref","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
363363
\"notaurl\"}","tags":{},"locked":false,"last_modified":"2021-03-17T16:24:43+00:00"}'
364364
headers:
365365
access-control-allow-credentials:
@@ -395,7 +395,7 @@ interactions:
395395
code: 200
396396
message: OK
397397
- request:
398-
body: '{"key": "aref1", "content_type": "fkaeyjfdkal;", "value": "{\"secret_uri\":
398+
body: '{"key": "aref1", "content_type": "fkaeyjfdkal;", "value": "{\"uri\":
399399
\"notaurl\"}", "tags": {}}'
400400
headers:
401401
Accept:
@@ -420,7 +420,7 @@ interactions:
420420
uri: https://fake_app_config.azconfig-test.io/kv/aref1?api-version=1.0
421421
response:
422422
body:
423-
string: '{"etag":"in0i0hpX7lRB0kHfOEuuxavvN4o","key":"aref1","label":null,"content_type":"fkaeyjfdkal;","value":"{\"secret_uri\":
423+
string: '{"etag":"in0i0hpX7lRB0kHfOEuuxavvN4o","key":"aref1","label":null,"content_type":"fkaeyjfdkal;","value":"{\"uri\":
424424
\"notaurl\"}","tags":{},"locked":false,"last_modified":"2021-03-17T16:24:43+00:00"}'
425425
headers:
426426
access-control-allow-credentials:
@@ -476,7 +476,7 @@ interactions:
476476
uri: https://fake_app_config.azconfig-test.io/kv/aref1?api-version=1.0
477477
response:
478478
body:
479-
string: '{"etag":"in0i0hpX7lRB0kHfOEuuxavvN4o","key":"aref1","label":null,"content_type":"fkaeyjfdkal;","value":"{\"secret_uri\":
479+
string: '{"etag":"in0i0hpX7lRB0kHfOEuuxavvN4o","key":"aref1","label":null,"content_type":"fkaeyjfdkal;","value":"{\"uri\":
480480
\"notaurl\"}","tags":{},"locked":false,"last_modified":"2021-03-17T16:24:43+00:00"}'
481481
headers:
482482
access-control-allow-credentials:

sdk/appconfiguration/azure-appconfiguration/tests/recordings/test_azure_configuration_client.test_config_setting_secret_reference.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ interactions:
279279
message: OK
280280
- request:
281281
body: '{"key": "ConnectionString", "content_type": "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8",
282-
"value": "{\"secret_uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
282+
"value": "{\"uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
283283
"tags": {}}'
284284
headers:
285285
Accept:
@@ -304,7 +304,7 @@ interactions:
304304
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
305305
response:
306306
body:
307-
string: '{"etag":"noRNIQV4p3jlzPGjmS8qNIARE4Z","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
307+
string: '{"etag":"noRNIQV4p3jlzPGjmS8qNIARE4Z","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
308308
\"https://test-test.vault.azure.net/secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:47+00:00"}'
309309
headers:
310310
access-control-allow-credentials:
@@ -341,7 +341,7 @@ interactions:
341341
message: OK
342342
- request:
343343
body: '{"key": "ConnectionString", "content_type": "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8",
344-
"value": "{\"secret_uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
344+
"value": "{\"uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
345345
"last_modified": "2021-03-30T16:18:47.000Z", "tags": {}, "locked": false, "etag":
346346
"noRNIQV4p3jlzPGjmS8qNIARE4Z"}'
347347
headers:
@@ -367,7 +367,7 @@ interactions:
367367
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
368368
response:
369369
body:
370-
string: '{"etag":"inYK833dmGpyBM7jdlu69devKCI","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
370+
string: '{"etag":"inYK833dmGpyBM7jdlu69devKCI","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
371371
\"https://test-test.vault.azure.net/secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:48+00:00"}'
372372
headers:
373373
access-control-allow-credentials:
@@ -425,7 +425,7 @@ interactions:
425425
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
426426
response:
427427
body:
428-
string: '{"etag":"inYK833dmGpyBM7jdlu69devKCI","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
428+
string: '{"etag":"inYK833dmGpyBM7jdlu69devKCI","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
429429
\"https://test-test.vault.azure.net/secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:48+00:00"}'
430430
headers:
431431
access-control-allow-credentials:

sdk/appconfiguration/azure-appconfiguration/tests/recordings/test_azure_configuration_client_aad.test_config_setting_secret_reference.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ interactions:
279279
message: OK
280280
- request:
281281
body: '{"key": "ConnectionString", "content_type": "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8",
282-
"value": "{\"secret_uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
282+
"value": "{\"uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
283283
"tags": {}}'
284284
headers:
285285
Accept:
@@ -304,7 +304,7 @@ interactions:
304304
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
305305
response:
306306
body:
307-
string: '{"etag":"6DfiLycS3eX8Ba67imiq467YMwt","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
307+
string: '{"etag":"6DfiLycS3eX8Ba67imiq467YMwt","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
308308
\"https://test-test.vault.azure.net/secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:49+00:00"}'
309309
headers:
310310
access-control-allow-credentials:
@@ -341,7 +341,7 @@ interactions:
341341
message: OK
342342
- request:
343343
body: '{"key": "ConnectionString", "content_type": "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8",
344-
"value": "{\"secret_uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
344+
"value": "{\"uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
345345
"last_modified": "2021-03-30T16:18:49.000Z", "tags": {}, "locked": false, "etag":
346346
"6DfiLycS3eX8Ba67imiq467YMwt"}'
347347
headers:
@@ -367,7 +367,7 @@ interactions:
367367
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
368368
response:
369369
body:
370-
string: '{"etag":"7NL7NOyLmOrwBLLaKJpGw5woPzk","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
370+
string: '{"etag":"7NL7NOyLmOrwBLLaKJpGw5woPzk","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
371371
\"https://test-test.vault.azure.net/secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:49+00:00"}'
372372
headers:
373373
access-control-allow-credentials:
@@ -425,7 +425,7 @@ interactions:
425425
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
426426
response:
427427
body:
428-
string: '{"etag":"7NL7NOyLmOrwBLLaKJpGw5woPzk","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
428+
string: '{"etag":"7NL7NOyLmOrwBLLaKJpGw5woPzk","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
429429
\"https://test-test.vault.azure.net/secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:49+00:00"}'
430430
headers:
431431
access-control-allow-credentials:

sdk/appconfiguration/azure-appconfiguration/tests/recordings/test_azure_configuration_client_aad_async.test_config_setting_secret_reference.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ interactions:
279279
message: OK
280280
- request:
281281
body: '{"key": "ConnectionString", "content_type": "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8",
282-
"value": "{\"secret_uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
282+
"value": "{\"uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
283283
"tags": {}}'
284284
headers:
285285
Accept:
@@ -304,7 +304,7 @@ interactions:
304304
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
305305
response:
306306
body:
307-
string: '{"etag":"o90RpwBMVBl2swER9FgYfVKcygT","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
307+
string: '{"etag":"o90RpwBMVBl2swER9FgYfVKcygT","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
308308
\"https://test-test.vault.azure.net/secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:51+00:00"}'
309309
headers:
310310
access-control-allow-credentials:
@@ -341,7 +341,7 @@ interactions:
341341
message: OK
342342
- request:
343343
body: '{"key": "ConnectionString", "content_type": "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8",
344-
"value": "{\"secret_uri\": \"https://test-test.vault.azure.net/new_secrets/connectionString\"}",
344+
"value": "{\"uri\": \"https://test-test.vault.azure.net/new_secrets/connectionString\"}",
345345
"last_modified": "2021-03-30T16:18:51.000Z", "tags": {}, "locked": false, "etag":
346346
"o90RpwBMVBl2swER9FgYfVKcygT"}'
347347
headers:
@@ -367,7 +367,7 @@ interactions:
367367
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
368368
response:
369369
body:
370-
string: '{"etag":"ecPNJlEhWQ2IPgocOxQwQuOVG2q","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
370+
string: '{"etag":"ecPNJlEhWQ2IPgocOxQwQuOVG2q","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
371371
\"https://test-test.vault.azure.net/new_secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:52+00:00"}'
372372
headers:
373373
access-control-allow-credentials:
@@ -425,7 +425,7 @@ interactions:
425425
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
426426
response:
427427
body:
428-
string: '{"etag":"ecPNJlEhWQ2IPgocOxQwQuOVG2q","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
428+
string: '{"etag":"ecPNJlEhWQ2IPgocOxQwQuOVG2q","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
429429
\"https://test-test.vault.azure.net/new_secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:52+00:00"}'
430430
headers:
431431
access-control-allow-credentials:

sdk/appconfiguration/azure-appconfiguration/tests/recordings/test_azure_configuration_client_async.test_config_setting_secret_reference.yaml

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -279,7 +279,7 @@ interactions:
279279
message: OK
280280
- request:
281281
body: '{"key": "ConnectionString", "content_type": "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8",
282-
"value": "{\"secret_uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
282+
"value": "{\"uri\": \"https://test-test.vault.azure.net/secrets/connectionString\"}",
283283
"tags": {}}'
284284
headers:
285285
Accept:
@@ -304,7 +304,7 @@ interactions:
304304
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
305305
response:
306306
body:
307-
string: '{"etag":"uKrULBFGUzednnilA3kn8SXEDAM","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
307+
string: '{"etag":"uKrULBFGUzednnilA3kn8SXEDAM","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
308308
\"https://test-test.vault.azure.net/secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:54+00:00"}'
309309
headers:
310310
access-control-allow-credentials:
@@ -341,7 +341,7 @@ interactions:
341341
message: OK
342342
- request:
343343
body: '{"key": "ConnectionString", "content_type": "application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8",
344-
"value": "{\"secret_uri\": \"https://test-test.vault.azure.net/new_secrets/connectionString\"}",
344+
"value": "{\"uri\": \"https://test-test.vault.azure.net/new_secrets/connectionString\"}",
345345
"last_modified": "2021-03-30T16:18:54.000Z", "tags": {}, "locked": false, "etag":
346346
"uKrULBFGUzednnilA3kn8SXEDAM"}'
347347
headers:
@@ -367,7 +367,7 @@ interactions:
367367
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
368368
response:
369369
body:
370-
string: '{"etag":"d65cJir9UhQg8zEZBJgIQMOQ7sj","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
370+
string: '{"etag":"d65cJir9UhQg8zEZBJgIQMOQ7sj","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
371371
\"https://test-test.vault.azure.net/new_secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:54+00:00"}'
372372
headers:
373373
access-control-allow-credentials:
@@ -425,7 +425,7 @@ interactions:
425425
uri: https://fake_app_config.azconfig-test.io/kv/ConnectionString?api-version=1.0
426426
response:
427427
body:
428-
string: '{"etag":"d65cJir9UhQg8zEZBJgIQMOQ7sj","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"secret_uri\":
428+
string: '{"etag":"d65cJir9UhQg8zEZBJgIQMOQ7sj","key":"ConnectionString","label":null,"content_type":"application/vnd.microsoft.appconfig.keyvaultref+json;charset=utf-8","value":"{\"uri\":
429429
\"https://test-test.vault.azure.net/new_secrets/connectionString\"}","tags":{},"locked":false,"last_modified":"2021-03-30T16:18:54+00:00"}'
430430
headers:
431431
access-control-allow-credentials:

sdk/appconfiguration/azure-appconfiguration/tests/test_azure_configuration_client.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -559,9 +559,9 @@ def test_config_setting_secret_reference(self, client):
559559
new_uri2 = "https://aka.ms/azsdk/python"
560560
updated_flag.secret_id = new_uri
561561
temp = json.loads(updated_flag.value)
562-
assert temp['secret_uri'] == new_uri
562+
assert temp['uri'] == new_uri
563563

564-
updated_flag.value = json.dumps({'secret_uri': new_uri2})
564+
updated_flag.value = json.dumps({'uri': new_uri2})
565565
assert updated_flag.secret_id == new_uri2
566566

567567
set_flag.value = "bad_value"

sdk/appconfiguration/azure-appconfiguration/tests/test_azure_configuration_client_aad.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -548,9 +548,9 @@ def test_config_setting_secret_reference(self, client):
548548
new_uri2 = "https://aka.ms/azsdk/python"
549549
updated_flag.secret_id = new_uri
550550
temp = json.loads(updated_flag.value)
551-
assert temp['secret_uri'] == new_uri
551+
assert temp['uri'] == new_uri
552552

553-
updated_flag.value = json.dumps({'secret_uri': new_uri2})
553+
updated_flag.value = json.dumps({'uri': new_uri2})
554554
assert updated_flag.secret_id == new_uri2
555555

556556
set_flag.value = "bad_value"

0 commit comments

Comments
 (0)