def add_sanitizers(test_proxy): add_remove_header_sanitizer(headers="Ocp-Apim-Subscription-Key") add_remove_header_sanitizer(headers="Retry-After") add_general_regex_sanitizer( value="fakeendpoint", regex="(?<=\\/\\/)[a-z-]+(?=\\.cognitiveservices\\.azure\\.com)" ) add_general_regex_sanitizer( regex="(?<=\\/\\/)[a-z]+(?=(?:|-secondary)\\.(?:table|blob|queue)\\.core\\.windows\\.net)", value="fakeendpoint", ) add_oauth_response_sanitizer() # run tests yield # Dogfood env uses a static storage account so we clean up the blob resources # This is unnecessary for AzureCloud where each storage account is deleted at the end of testing if is_live() and os.getenv("TRANSLATION_ENVIRONMENT") == "Dogfood": client = BlobServiceClient( "https://" + os.getenv("TRANSLATION_DOCUMENT_STORAGE_NAME") + ".blob.core.windows.net/", os.getenv("TRANSLATION_DOCUMENT_STORAGE_KEY") ) for container in client.list_containers(): client.delete_container(container)
def add_sanitizers(test_proxy): add_remove_header_sanitizer(headers="Ocp-Apim-Subscription-Key") add_general_regex_sanitizer( value="fakeendpoint", regex="(?<=\\/\\/)[a-z-]+(?=\\.cognitiveservices\\.azure\\.com)") add_oauth_response_sanitizer() add_body_key_sanitizer( json_path="urlSource", value="blob_sas_url", regex="(?<=\\/\\/)[a-z-]+(?=\\.blob\\.core\\.windows\\.net)(.*)$", ) add_body_key_sanitizer( json_path="azureBlobSource.containerUrl", value="blob_sas_url", regex="(?<=\\/\\/)[a-z-]+(?=\\.blob\\.core\\.windows\\.net)(.*)$", ) add_body_key_sanitizer( json_path="source", value="blob_sas_url", regex="(?<=\\/\\/)[a-z-]+(?=\\.blob\\.core\\.windows\\.net)(.*)$", ) add_body_key_sanitizer( json_path="accessToken", value="redacted", regex="([0-9a-f-]{36})", ) add_body_key_sanitizer( json_path="copyAuthorization.accessToken", value="redacted", regex="([0-9a-f-]{36})", )
def add_sanitizers(test_proxy): subscription_id = os.environ.get("AZURE_SUBSCRIPTION_ID", "00000000-0000-0000-0000-000000000000") tenant_id = os.environ.get("AZURE_TENANT_ID", "00000000-0000-0000-0000-000000000000") add_general_regex_sanitizer(regex=subscription_id, value="00000000-0000-0000-0000-000000000000") add_general_regex_sanitizer(regex=tenant_id, value="00000000-0000-0000-0000-000000000000")
def add_sanitizers(test_proxy): subscription_id = os.environ.get("AZURE_SUBSCRIPTION_ID", "00000000-0000-0000-0000-000000000000") tenant_id = os.environ.get("AZURE_TENANT_ID", "00000000-0000-0000-0000-000000000000") add_general_regex_sanitizer(regex=subscription_id, value="00000000-0000-0000-0000-000000000000") add_general_regex_sanitizer(regex=tenant_id, value="00000000-0000-0000-0000-000000000000") add_header_regex_sanitizer(key="Set-Cookie", value="[set-cookie;]") add_header_regex_sanitizer(key="Cookie", value="cookie;") add_body_key_sanitizer(json_path="$..access_token", value="access_token") add_body_key_sanitizer(json_path="$..primaryKey", value="primaryKey") add_body_key_sanitizer(json_path="$..secondaryKey", value="secondaryKey") add_body_key_sanitizer(json_path="$..secondaryConnectionString", value="secondaryConnectionString")
def add_sanitizers(test_proxy): # sanitizes table/cosmos account names in URLs add_general_regex_sanitizer( value="fakeendpoint", regex= "(?<=\\/\\/)[a-z]+(?=(?:|-secondary)\\.(?:table|blob|queue)\\.(?:cosmos|core)\\." "(?:azure|windows)\\.(?:com|net))", ) # sanitizes random UUIDs that are sent in batch request headers and bodies add_general_regex_sanitizer( value="00000000-0000-0000-0000-000000000000", regex= "batch[a-z]*_([0-9a-f]{8}\\b-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-\\b[0-9a-f]{12}\\b)", group_for_replace="1", )
def add_sanitizers(test_proxy): azure_keyvault_url = os.getenv("azure_keyvault_url", "https://vaultname.vault.azure.net") azure_keyvault_url = azure_keyvault_url.rstrip("/") keyvault_tenant_id = os.getenv("keyvault_tenant_id", "keyvault_tenant_id") keyvault_subscription_id = os.getenv("keyvault_subscription_id", "keyvault_subscription_id") add_general_regex_sanitizer(regex=azure_keyvault_url, value="https://vaultname.vault.azure.net") add_general_regex_sanitizer(regex=keyvault_tenant_id, value="00000000-0000-0000-0000-000000000000") add_general_regex_sanitizer(regex=keyvault_subscription_id, value="00000000-0000-0000-0000-000000000000") add_oauth_response_sanitizer()
def add_sanitizers(test_proxy): add_remove_header_sanitizer(headers="Ocp-Apim-Subscription-Key") add_general_regex_sanitizer( value="fakeendpoint", regex="(?<=\\/\\/)[a-z-]+(?=\\.cognitiveservices\\.azure\\.com)") add_oauth_response_sanitizer()
def add_sanitizers(test_proxy): service_endpoint = os.getenv( "METRICS_ADVISOR_ENDPOINT", "https://fakeendpoint.cognitiveservices.azure.com") service_endpoint = service_endpoint.rstrip("/") subscription_key = os.getenv("METRICS_ADVISOR_SUBSCRIPTION_KEY", "metrics_advisor_subscription_key") api_key = os.getenv("METRICS_ADVISOR_API_KEY", "metrics_advisor_api_key") metrics_advisor_sql_server_connection_string = os.getenv( "METRICS_ADVISOR_SQL_SERVER_CONNECTION_STRING", "metrics_advisor_sql_server_connection_string") metrics_advisor_anomaly_detection_configuration_id = os.getenv( "METRICS_ADVISOR_ANOMALY_DETECTION_CONFIGURATION_ID", "metrics_advisor_anomaly_detection_configuration_id") metrics_advisor_data_feed_id = os.getenv("METRICS_ADVISOR_DATA_FEED_ID", "metrics_advisor_data_feed_id") metrics_advisor_metric_id = os.getenv("METRICS_ADVISOR_METRIC_ID", "metrics_advisor_metric_id") metrics_advisor_anomaly_alert_configuration_id = os.getenv( "METRICS_ADVISOR_ANOMALY_ALERT_CONFIGURATION_ID", "metrics_advisor_anomaly_alert_configuration_id") metrics_advisor_incident_id = os.getenv("METRICS_ADVISOR_INCIDENT_ID", "metrics_advisor_incident_id") metrics_advisor_feedback_id = os.getenv("METRICS_ADVISOR_FEEDBACK_ID", "metrics_advisor_feedback_id") metrics_advisor_alert_id = os.getenv("METRICS_ADVISOR_ALERT_ID", "metrics_advisor_alert_id") add_general_regex_sanitizer( regex=service_endpoint, value="https://fakeendpoint.cognitiveservices.azure.com") add_general_regex_sanitizer(regex=subscription_key, value="metrics_advisor_subscription_key") add_general_regex_sanitizer(regex=api_key, value="metrics_advisor_api_key") add_general_regex_sanitizer( regex=metrics_advisor_sql_server_connection_string, value="metrics_advisor_sql_server_connection_string") add_general_regex_sanitizer( regex=metrics_advisor_anomaly_detection_configuration_id, value="metrics_advisor_anomaly_detection_configuration_id") add_general_regex_sanitizer(regex=metrics_advisor_data_feed_id, value="metrics_advisor_data_feed_id") add_general_regex_sanitizer(regex=metrics_advisor_metric_id, value="metrics_advisor_metric_id") add_general_regex_sanitizer( regex=metrics_advisor_anomaly_alert_configuration_id, value="metrics_advisor_anomaly_alert_configuration_id") add_general_regex_sanitizer(regex=metrics_advisor_incident_id, value="metrics_advisor_incident_id") add_general_regex_sanitizer(regex=metrics_advisor_feedback_id, value="metrics_advisor_feedback_id") add_general_regex_sanitizer(regex=metrics_advisor_alert_id, value="metrics_advisor_alert_id") add_remove_header_sanitizer(headers="Ocp-Apim-Subscription-Key") add_remove_header_sanitizer(headers="x-api-key") add_oauth_response_sanitizer()
def add_sanitizers(test_proxy): add_general_regex_sanitizer( regex="(?<=\\/\\/)[a-z-]+(?=\\.servicebus\\.windows\\.net)", value="fake_resource") add_oauth_response_sanitizer()