def test_redact_sensitive_data_does_redacts_with_default_string(self): """When redact_value is absent, REDACT_SENSITIVE_VALUE is used.""" md = { "sensitive_keys": ["md/secure"], "md": { "secure": "s3kr1t", "insecure": "publik" }, } secure_md = copy.deepcopy(md) secure_md["md"]["secure"] = "redacted for non-root user" self.assertEqual(secure_md, redact_sensitive_keys(md))
def test_redact_sensitive_data_does_redacts_with_default_string(self): """When redact_value is absent, REDACT_SENSITIVE_VALUE is used.""" md = { 'sensitive_keys': ['md/secure'], 'md': { 'secure': 's3kr1t', 'insecure': 'publik' } } secure_md = copy.deepcopy(md) secure_md['md']['secure'] = 'redacted for non-root user' self.assertEqual(secure_md, redact_sensitive_keys(md))
def test_redact_sensitive_data_redacts_exact_match_name(self): """Only exact matched sensitive_keys are redacted from metadata.""" md = { "sensitive_keys": ["md/secure"], "md": { "secure": "s3kr1t", "insecure": "publik" }, } secure_md = copy.deepcopy(md) secure_md["md"]["secure"] = "redacted" self.assertEqual(secure_md, redact_sensitive_keys(md, redact_value="redacted"))
def test_redact_sensitive_data_redacts_exact_match_name(self): """Only exact matched sensitive_keys are redacted from metadata.""" md = { 'sensitive_keys': ['md/secure'], 'md': { 'secure': 's3kr1t', 'insecure': 'publik' } } secure_md = copy.deepcopy(md) secure_md['md']['secure'] = 'redacted' self.assertEqual(secure_md, redact_sensitive_keys(md, redact_value='redacted'))