Exemple #1
0
def add_sanitizers(test_proxy):
    add_remove_header_sanitizer(headers="Ocp-Apim-Subscription-Key")
    add_remove_header_sanitizer(headers="Retry-After")
    add_general_regex_sanitizer(
        value="fakeendpoint",
        regex="(?<=\\/\\/)[a-z-]+(?=\\.cognitiveservices\\.azure\\.com)"
    )
    add_general_regex_sanitizer(
        regex="(?<=\\/\\/)[a-z]+(?=(?:|-secondary)\\.(?:table|blob|queue)\\.core\\.windows\\.net)",
        value="fakeendpoint",
    )
    add_oauth_response_sanitizer()

    # run tests
    yield

    # Dogfood env uses a static storage account so we clean up the blob resources
    # This is unnecessary for AzureCloud where each storage account is deleted at the end of testing
    if is_live() and os.getenv("TRANSLATION_ENVIRONMENT") == "Dogfood":
        client = BlobServiceClient(
            "https://" + os.getenv("TRANSLATION_DOCUMENT_STORAGE_NAME") + ".blob.core.windows.net/",
            os.getenv("TRANSLATION_DOCUMENT_STORAGE_KEY")
        )
        for container in client.list_containers():
            client.delete_container(container)
def add_sanitizers(test_proxy):
    add_remove_header_sanitizer(headers="Ocp-Apim-Subscription-Key")
    add_general_regex_sanitizer(
        value="fakeendpoint",
        regex="(?<=\\/\\/)[a-z-]+(?=\\.cognitiveservices\\.azure\\.com)")
    add_oauth_response_sanitizer()
    add_body_key_sanitizer(
        json_path="urlSource",
        value="blob_sas_url",
        regex="(?<=\\/\\/)[a-z-]+(?=\\.blob\\.core\\.windows\\.net)(.*)$",
    )
    add_body_key_sanitizer(
        json_path="azureBlobSource.containerUrl",
        value="blob_sas_url",
        regex="(?<=\\/\\/)[a-z-]+(?=\\.blob\\.core\\.windows\\.net)(.*)$",
    )
    add_body_key_sanitizer(
        json_path="source",
        value="blob_sas_url",
        regex="(?<=\\/\\/)[a-z-]+(?=\\.blob\\.core\\.windows\\.net)(.*)$",
    )
    add_body_key_sanitizer(
        json_path="accessToken",
        value="redacted",
        regex="([0-9a-f-]{36})",
    )

    add_body_key_sanitizer(
        json_path="copyAuthorization.accessToken",
        value="redacted",
        regex="([0-9a-f-]{36})",
    )
def add_sanitizers(test_proxy):
    subscription_id = os.environ.get("AZURE_SUBSCRIPTION_ID",
                                     "00000000-0000-0000-0000-000000000000")
    tenant_id = os.environ.get("AZURE_TENANT_ID",
                               "00000000-0000-0000-0000-000000000000")
    add_general_regex_sanitizer(regex=subscription_id,
                                value="00000000-0000-0000-0000-000000000000")
    add_general_regex_sanitizer(regex=tenant_id,
                                value="00000000-0000-0000-0000-000000000000")
def add_sanitizers(test_proxy):
    subscription_id = os.environ.get("AZURE_SUBSCRIPTION_ID", "00000000-0000-0000-0000-000000000000")
    tenant_id = os.environ.get("AZURE_TENANT_ID", "00000000-0000-0000-0000-000000000000")
    add_general_regex_sanitizer(regex=subscription_id, value="00000000-0000-0000-0000-000000000000")
    add_general_regex_sanitizer(regex=tenant_id, value="00000000-0000-0000-0000-000000000000")
    add_header_regex_sanitizer(key="Set-Cookie", value="[set-cookie;]")
    add_header_regex_sanitizer(key="Cookie", value="cookie;")
    add_body_key_sanitizer(json_path="$..access_token", value="access_token")
    add_body_key_sanitizer(json_path="$..primaryKey", value="primaryKey")
    add_body_key_sanitizer(json_path="$..secondaryKey", value="secondaryKey")
    add_body_key_sanitizer(json_path="$..secondaryConnectionString", value="secondaryConnectionString")
def add_sanitizers(test_proxy):
    # sanitizes table/cosmos account names in URLs
    add_general_regex_sanitizer(
        value="fakeendpoint",
        regex=
        "(?<=\\/\\/)[a-z]+(?=(?:|-secondary)\\.(?:table|blob|queue)\\.(?:cosmos|core)\\."
        "(?:azure|windows)\\.(?:com|net))",
    )
    # sanitizes random UUIDs that are sent in batch request headers and bodies
    add_general_regex_sanitizer(
        value="00000000-0000-0000-0000-000000000000",
        regex=
        "batch[a-z]*_([0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b)",
        group_for_replace="1",
    )
Exemple #6
0
def add_sanitizers(test_proxy):
    azure_keyvault_url = os.getenv("azure_keyvault_url",
                                   "https://vaultname.vault.azure.net")
    azure_keyvault_url = azure_keyvault_url.rstrip("/")
    keyvault_tenant_id = os.getenv("keyvault_tenant_id", "keyvault_tenant_id")
    keyvault_subscription_id = os.getenv("keyvault_subscription_id",
                                         "keyvault_subscription_id")

    add_general_regex_sanitizer(regex=azure_keyvault_url,
                                value="https://vaultname.vault.azure.net")
    add_general_regex_sanitizer(regex=keyvault_tenant_id,
                                value="00000000-0000-0000-0000-000000000000")
    add_general_regex_sanitizer(regex=keyvault_subscription_id,
                                value="00000000-0000-0000-0000-000000000000")
    add_oauth_response_sanitizer()
def add_sanitizers(test_proxy):
    add_remove_header_sanitizer(headers="Ocp-Apim-Subscription-Key")
    add_general_regex_sanitizer(
        value="fakeendpoint",
        regex="(?<=\\/\\/)[a-z-]+(?=\\.cognitiveservices\\.azure\\.com)")
    add_oauth_response_sanitizer()
def add_sanitizers(test_proxy):
    service_endpoint = os.getenv(
        "METRICS_ADVISOR_ENDPOINT",
        "https://fakeendpoint.cognitiveservices.azure.com")
    service_endpoint = service_endpoint.rstrip("/")
    subscription_key = os.getenv("METRICS_ADVISOR_SUBSCRIPTION_KEY",
                                 "metrics_advisor_subscription_key")
    api_key = os.getenv("METRICS_ADVISOR_API_KEY", "metrics_advisor_api_key")
    metrics_advisor_sql_server_connection_string = os.getenv(
        "METRICS_ADVISOR_SQL_SERVER_CONNECTION_STRING",
        "metrics_advisor_sql_server_connection_string")
    metrics_advisor_anomaly_detection_configuration_id = os.getenv(
        "METRICS_ADVISOR_ANOMALY_DETECTION_CONFIGURATION_ID",
        "metrics_advisor_anomaly_detection_configuration_id")
    metrics_advisor_data_feed_id = os.getenv("METRICS_ADVISOR_DATA_FEED_ID",
                                             "metrics_advisor_data_feed_id")
    metrics_advisor_metric_id = os.getenv("METRICS_ADVISOR_METRIC_ID",
                                          "metrics_advisor_metric_id")
    metrics_advisor_anomaly_alert_configuration_id = os.getenv(
        "METRICS_ADVISOR_ANOMALY_ALERT_CONFIGURATION_ID",
        "metrics_advisor_anomaly_alert_configuration_id")
    metrics_advisor_incident_id = os.getenv("METRICS_ADVISOR_INCIDENT_ID",
                                            "metrics_advisor_incident_id")
    metrics_advisor_feedback_id = os.getenv("METRICS_ADVISOR_FEEDBACK_ID",
                                            "metrics_advisor_feedback_id")
    metrics_advisor_alert_id = os.getenv("METRICS_ADVISOR_ALERT_ID",
                                         "metrics_advisor_alert_id")

    add_general_regex_sanitizer(
        regex=service_endpoint,
        value="https://fakeendpoint.cognitiveservices.azure.com")
    add_general_regex_sanitizer(regex=subscription_key,
                                value="metrics_advisor_subscription_key")
    add_general_regex_sanitizer(regex=api_key, value="metrics_advisor_api_key")
    add_general_regex_sanitizer(
        regex=metrics_advisor_sql_server_connection_string,
        value="metrics_advisor_sql_server_connection_string")
    add_general_regex_sanitizer(
        regex=metrics_advisor_anomaly_detection_configuration_id,
        value="metrics_advisor_anomaly_detection_configuration_id")
    add_general_regex_sanitizer(regex=metrics_advisor_data_feed_id,
                                value="metrics_advisor_data_feed_id")
    add_general_regex_sanitizer(regex=metrics_advisor_metric_id,
                                value="metrics_advisor_metric_id")
    add_general_regex_sanitizer(
        regex=metrics_advisor_anomaly_alert_configuration_id,
        value="metrics_advisor_anomaly_alert_configuration_id")
    add_general_regex_sanitizer(regex=metrics_advisor_incident_id,
                                value="metrics_advisor_incident_id")
    add_general_regex_sanitizer(regex=metrics_advisor_feedback_id,
                                value="metrics_advisor_feedback_id")
    add_general_regex_sanitizer(regex=metrics_advisor_alert_id,
                                value="metrics_advisor_alert_id")
    add_remove_header_sanitizer(headers="Ocp-Apim-Subscription-Key")
    add_remove_header_sanitizer(headers="x-api-key")
    add_oauth_response_sanitizer()
Exemple #9
0
def add_sanitizers(test_proxy):
    add_general_regex_sanitizer(
        regex="(?<=\\/\\/)[a-z-]+(?=\\.servicebus\\.windows\\.net)",
        value="fake_resource")
    add_oauth_response_sanitizer()