Skip to content

Commit ecc8b74

Browse files
committed
disable user creation
1 parent b0b444f commit ecc8b74

File tree

1 file changed

+67
-62
lines changed
  • sdk/keyvault/azure-resourcemanager-keyvault/src/test/java/com/azure/resourcemanager/keyvault

1 file changed

+67
-62
lines changed

sdk/keyvault/azure-resourcemanager-keyvault/src/test/java/com/azure/resourcemanager/keyvault/VaultTests.java

Lines changed: 67 additions & 62 deletions
Original file line numberDiff line numberDiff line change
@@ -28,13 +28,14 @@ public class VaultTests extends KeyVaultManagementTest {
2828
public void canCRUDVault() throws Exception {
2929
// Create user service principal
3030
// String sp = generateRandomResourceName("sp", 20);
31-
String us = generateRandomResourceName("us", 20);
31+
// String us = generateRandomResourceName("us", 20);
3232
// issue: https://github.com/Azure/azure-sdk-for-java/issues/47117
3333
// ServicePrincipal servicePrincipal
3434
// = authorizationManager.servicePrincipals().define(sp).withNewApplication().create();
3535

36-
ActiveDirectoryUser user
37-
= authorizationManager.users().define(us).withEmailAlias(us).withPassword(password()).create();
36+
// Status code 403, "{"error":{"code":"Authorization_RequestDenied","message":"Insufficient privileges to complete the operation."
37+
// ActiveDirectoryUser user
38+
// = authorizationManager.users().define(us).withEmailAlias(us).withPassword(password()).create();
3839

3940
try {
4041
// CREATE
@@ -48,14 +49,15 @@ public void canCRUDVault() throws Exception {
4849
// .allowSecretAllPermissions()
4950
// .allowCertificatePermissions(CertificatePermissions.GET)
5051
// .attach()
51-
.defineAccessPolicy()
52-
.forUser(us)
53-
.allowKeyAllPermissions()
54-
.allowSecretAllPermissions()
55-
.allowCertificatePermissions(CertificatePermissions.GET, CertificatePermissions.LIST,
56-
CertificatePermissions.CREATE)
57-
.attach()
52+
// .defineAccessPolicy()
53+
// .forUser(us)
54+
// .allowKeyAllPermissions()
55+
// .allowSecretAllPermissions()
56+
// .allowCertificatePermissions(CertificatePermissions.GET, CertificatePermissions.LIST,
57+
// CertificatePermissions.CREATE)
58+
// .attach()
5859
// .withBypass(NetworkRuleBypassOptions.AZURE_SERVICES)
60+
.withEmptyAccessPolicy()
5961
.withAccessFromAzureServices()
6062
.withAccessFromIpAddress("0.0.0.0/0")
6163
.create();
@@ -74,11 +76,11 @@ public void canCRUDVault() throws Exception {
7476
// Assertions.assertArrayEquals(new CertificatePermissions[] { CertificatePermissions.GET },
7577
// policy.permissions().certificates().toArray());
7678
// }
77-
if (policy.objectId().equals(user.id())) {
78-
Assertions.assertEquals(KeyPermissions.values().size(), policy.permissions().keys().size());
79-
Assertions.assertEquals(SecretPermissions.values().size(), policy.permissions().secrets().size());
80-
Assertions.assertEquals(3, policy.permissions().certificates().size());
81-
}
79+
// if (policy.objectId().equals(user.id())) {
80+
// Assertions.assertEquals(KeyPermissions.values().size(), policy.permissions().keys().size());
81+
// Assertions.assertEquals(SecretPermissions.values().size(), policy.permissions().secrets().size());
82+
// Assertions.assertEquals(3, policy.permissions().certificates().size());
83+
// }
8284
}
8385
// LIST
8486
PagedIterable<Vault> vaults = keyVaultManager.vaults().listByResourceGroup(rgName);
@@ -91,20 +93,20 @@ public void canCRUDVault() throws Exception {
9193
Assertions.assertNotNull(vault);
9294
// UPDATE
9395
vault.update()
94-
.updateAccessPolicy(user.id())
95-
.allowKeyAllPermissions()
96-
.disallowSecretAllPermissions()
97-
.allowCertificateAllPermissions()
98-
.parent()
96+
// .updateAccessPolicy(user.id())
97+
// .allowKeyAllPermissions()
98+
// .disallowSecretAllPermissions()
99+
// .allowCertificateAllPermissions()
100+
// .parent()
99101
.withTag("foo", "bar")
100102
.apply();
101103
for (AccessPolicy policy : vault.accessPolicies()) {
102-
if (policy.objectId().equals(user.id())) {
103-
Assertions.assertEquals(KeyPermissions.values().size(), policy.permissions().keys().size());
104-
Assertions.assertEquals(0, policy.permissions().secrets().size());
105-
Assertions.assertEquals(CertificatePermissions.values().size(),
106-
policy.permissions().certificates().size());
107-
}
104+
// if (policy.objectId().equals(user.id())) {
105+
// Assertions.assertEquals(KeyPermissions.values().size(), policy.permissions().keys().size());
106+
// Assertions.assertEquals(0, policy.permissions().secrets().size());
107+
// Assertions.assertEquals(CertificatePermissions.values().size(),
108+
// policy.permissions().certificates().size());
109+
// }
108110
}
109111

110112
// DELETE
@@ -144,13 +146,14 @@ void canCRUDVaultWithRbac() {
144146
public void canCRUDVaultAsync() throws Exception {
145147
// Create user service principal
146148
// String sp = generateRandomResourceName("sp", 20);
147-
String us = generateRandomResourceName("us", 20);
149+
// String us = generateRandomResourceName("us", 20);
148150
// issue: https://github.com/Azure/azure-sdk-for-java/issues/47117
149151
// ServicePrincipal servicePrincipal
150152
// = authorizationManager.servicePrincipals().define(sp).withNewApplication().create();
151153

152-
ActiveDirectoryUser user
153-
= authorizationManager.users().define(us).withEmailAlias(us).withPassword(password()).create();
154+
// Status code 403, "{"error":{"code":"Authorization_RequestDenied","message":"Insufficient privileges to complete the operation."
155+
// ActiveDirectoryUser user
156+
// = authorizationManager.users().define(us).withEmailAlias(us).withPassword(password()).create();
154157

155158
try {
156159
// CREATE
@@ -164,13 +167,14 @@ public void canCRUDVaultAsync() throws Exception {
164167
// .allowSecretAllPermissions()
165168
// .allowCertificatePermissions(CertificatePermissions.GET)
166169
// .attach()
167-
.defineAccessPolicy()
168-
.forUser(us)
169-
.allowKeyAllPermissions()
170-
.allowSecretAllPermissions()
171-
.allowCertificatePermissions(CertificatePermissions.GET, CertificatePermissions.LIST,
172-
CertificatePermissions.CREATE)
173-
.attach()
170+
// .defineAccessPolicy()
171+
// .forUser(us)
172+
// .allowKeyAllPermissions()
173+
// .allowSecretAllPermissions()
174+
// .allowCertificatePermissions(CertificatePermissions.GET, CertificatePermissions.LIST,
175+
// CertificatePermissions.CREATE)
176+
// .attach()
177+
.withEmptyAccessPolicy()
174178
.create();
175179
Assertions.assertNotNull(vault);
176180
//Assertions.assertFalse(vault.softDeleteEnabled());
@@ -185,11 +189,11 @@ public void canCRUDVaultAsync() throws Exception {
185189
// Assertions.assertArrayEquals(new CertificatePermissions[] { CertificatePermissions.GET },
186190
// policy.permissions().certificates().toArray());
187191
// }
188-
if (policy.objectId().equals(user.id())) {
189-
Assertions.assertEquals(KeyPermissions.values().size(), policy.permissions().keys().size());
190-
Assertions.assertEquals(SecretPermissions.values().size(), policy.permissions().secrets().size());
191-
Assertions.assertEquals(3, policy.permissions().certificates().size());
192-
}
192+
// if (policy.objectId().equals(user.id())) {
193+
// Assertions.assertEquals(KeyPermissions.values().size(), policy.permissions().keys().size());
194+
// Assertions.assertEquals(SecretPermissions.values().size(), policy.permissions().secrets().size());
195+
// Assertions.assertEquals(3, policy.permissions().certificates().size());
196+
// }
193197
}
194198
// LIST
195199
PagedIterable<Vault> vaults
@@ -203,20 +207,20 @@ public void canCRUDVaultAsync() throws Exception {
203207
Assertions.assertNotNull(vault);
204208
// UPDATE
205209
vault.update()
206-
.updateAccessPolicy(user.id())
207-
.allowKeyAllPermissions()
208-
.disallowSecretAllPermissions()
209-
.allowCertificateAllPermissions()
210-
.parent()
210+
// .updateAccessPolicy(user.id())
211+
// .allowKeyAllPermissions()
212+
// .disallowSecretAllPermissions()
213+
// .allowCertificateAllPermissions()
214+
// .parent()
211215
.withTag("foo", "bar")
212216
.apply();
213217
for (AccessPolicy policy : vault.accessPolicies()) {
214-
if (policy.objectId().equals(user.id())) {
215-
Assertions.assertEquals(KeyPermissions.values().size(), policy.permissions().keys().size());
216-
Assertions.assertEquals(0, policy.permissions().secrets().size());
217-
Assertions.assertEquals(CertificatePermissions.values().size(),
218-
policy.permissions().certificates().size());
219-
}
218+
// if (policy.objectId().equals(user.id())) {
219+
// Assertions.assertEquals(KeyPermissions.values().size(), policy.permissions().keys().size());
220+
// Assertions.assertEquals(0, policy.permissions().secrets().size());
221+
// Assertions.assertEquals(CertificatePermissions.values().size(),
222+
// policy.permissions().certificates().size());
223+
// }
220224
}
221225

222226
// DELETE
@@ -233,14 +237,14 @@ public void canCRUDVaultAsync() throws Exception {
233237
public void canEnableSoftDeleteAndPurge() throws InterruptedException {
234238
String otherVaultName = vaultName + "other";
235239
// String sp = generateRandomResourceName("sp", 20);
236-
String us = generateRandomResourceName("us", 20);
240+
// String us = generateRandomResourceName("us", 20);
237241

238242
// issue: https://github.com/Azure/azure-sdk-for-java/issues/47117
239243
// ServicePrincipal servicePrincipal
240244
// = authorizationManager.servicePrincipals().define(sp).withNewApplication().create();
241245

242-
ActiveDirectoryUser user
243-
= authorizationManager.users().define(us).withEmailAlias(us).withPassword(password()).create();
246+
// ActiveDirectoryUser user
247+
// = authorizationManager.users().define(us).withEmailAlias(us).withPassword(password()).create();
244248

245249
try {
246250
Vault vault = keyVaultManager.vaults()
@@ -253,13 +257,14 @@ public void canEnableSoftDeleteAndPurge() throws InterruptedException {
253257
// .allowSecretAllPermissions()
254258
// .allowCertificatePermissions(CertificatePermissions.GET)
255259
// .attach()
256-
.defineAccessPolicy()
257-
.forUser(us)
258-
.allowKeyAllPermissions()
259-
.allowSecretAllPermissions()
260-
.allowCertificatePermissions(CertificatePermissions.GET, CertificatePermissions.LIST,
261-
CertificatePermissions.CREATE)
262-
.attach()
260+
// .defineAccessPolicy()
261+
// .forUser(us)
262+
// .allowKeyAllPermissions()
263+
// .allowSecretAllPermissions()
264+
// .allowCertificatePermissions(CertificatePermissions.GET, CertificatePermissions.LIST,
265+
// CertificatePermissions.CREATE)
266+
// .attach()
267+
.withEmptyAccessPolicy()
263268
.create();
264269
Assertions.assertTrue(vault.softDeleteEnabled());
265270

0 commit comments

Comments
 (0)