Feature: Secrets Manager put_secret_value and list_secret_version_ids (#2116)
* initial work - adding put_secret_value and list_secret_versions * Added support for versions in all functions except rotate_secret * more work - refactor rotate_secret method - now, adds a new version of the secret and points default version id to it - updated implementation coverage readme - element in list check to fix unit test - fixed linting errors - added tests, fixed exception, failing tests still - secrets_manager/test_server fails when running whole suite, but not when running that individual test file * fixed failing test_get_secret_value * Removed test.py. Fixed condition statement. * fixed default stages + adding AWSPREVIOUS * remove old AWSPREVIOUS stages
This commit is contained in:
parent
8f4c273095
commit
bbd7fefb37
6 changed files with 425 additions and 82 deletions
|
|
@ -4,13 +4,15 @@ import boto3
|
|||
|
||||
from moto import mock_secretsmanager
|
||||
from botocore.exceptions import ClientError
|
||||
import sure # noqa
|
||||
import string
|
||||
import unittest
|
||||
import pytz
|
||||
from datetime import datetime
|
||||
import unittest
|
||||
from nose.tools import assert_raises
|
||||
|
||||
DEFAULT_SECRET_NAME = 'test-secret'
|
||||
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_get_secret_value():
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
|
|
@ -389,34 +391,32 @@ def test_restore_secret_that_does_not_exist():
|
|||
|
||||
@mock_secretsmanager
|
||||
def test_rotate_secret():
|
||||
secret_name = 'test-secret'
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
conn.create_secret(Name=secret_name,
|
||||
conn.create_secret(Name=DEFAULT_SECRET_NAME,
|
||||
SecretString='foosecret')
|
||||
|
||||
rotated_secret = conn.rotate_secret(SecretId=secret_name)
|
||||
rotated_secret = conn.rotate_secret(SecretId=DEFAULT_SECRET_NAME)
|
||||
|
||||
assert rotated_secret
|
||||
assert rotated_secret['ARN'] != '' # Test arn not empty
|
||||
assert rotated_secret['Name'] == secret_name
|
||||
assert rotated_secret['Name'] == DEFAULT_SECRET_NAME
|
||||
assert rotated_secret['VersionId'] != ''
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_rotate_secret_enable_rotation():
|
||||
secret_name = 'test-secret'
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
conn.create_secret(Name=secret_name,
|
||||
conn.create_secret(Name=DEFAULT_SECRET_NAME,
|
||||
SecretString='foosecret')
|
||||
|
||||
initial_description = conn.describe_secret(SecretId=secret_name)
|
||||
initial_description = conn.describe_secret(SecretId=DEFAULT_SECRET_NAME)
|
||||
assert initial_description
|
||||
assert initial_description['RotationEnabled'] is False
|
||||
assert initial_description['RotationRules']['AutomaticallyAfterDays'] == 0
|
||||
|
||||
conn.rotate_secret(SecretId=secret_name,
|
||||
conn.rotate_secret(SecretId=DEFAULT_SECRET_NAME,
|
||||
RotationRules={'AutomaticallyAfterDays': 42})
|
||||
|
||||
rotated_description = conn.describe_secret(SecretId=secret_name)
|
||||
rotated_description = conn.describe_secret(SecretId=DEFAULT_SECRET_NAME)
|
||||
assert rotated_description
|
||||
assert rotated_description['RotationEnabled'] is True
|
||||
assert rotated_description['RotationRules']['AutomaticallyAfterDays'] == 42
|
||||
|
|
@ -460,9 +460,8 @@ def test_rotate_secret_client_request_token_too_short():
|
|||
|
||||
@mock_secretsmanager
|
||||
def test_rotate_secret_client_request_token_too_long():
|
||||
secret_name = 'test-secret'
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
conn.create_secret(Name=secret_name,
|
||||
conn.create_secret(Name=DEFAULT_SECRET_NAME,
|
||||
SecretString='foosecret')
|
||||
|
||||
client_request_token = (
|
||||
|
|
@ -470,19 +469,18 @@ def test_rotate_secret_client_request_token_too_long():
|
|||
'ED9F8B6C-85B7-446A-B7E4-38F2A3BEB13C'
|
||||
)
|
||||
with assert_raises(ClientError):
|
||||
result = conn.rotate_secret(SecretId=secret_name,
|
||||
result = conn.rotate_secret(SecretId=DEFAULT_SECRET_NAME,
|
||||
ClientRequestToken=client_request_token)
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_rotate_secret_rotation_lambda_arn_too_long():
|
||||
secret_name = 'test-secret'
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
conn.create_secret(Name=secret_name,
|
||||
conn.create_secret(Name=DEFAULT_SECRET_NAME,
|
||||
SecretString='foosecret')
|
||||
|
||||
rotation_lambda_arn = '85B7-446A-B7E4' * 147 # == 2058 characters
|
||||
with assert_raises(ClientError):
|
||||
result = conn.rotate_secret(SecretId=secret_name,
|
||||
result = conn.rotate_secret(SecretId=DEFAULT_SECRET_NAME,
|
||||
RotationLambdaARN=rotation_lambda_arn)
|
||||
|
||||
@mock_secretsmanager
|
||||
|
|
@ -494,12 +492,78 @@ def test_rotate_secret_rotation_period_zero():
|
|||
|
||||
@mock_secretsmanager
|
||||
def test_rotate_secret_rotation_period_too_long():
|
||||
secret_name = 'test-secret'
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
conn.create_secret(Name=secret_name,
|
||||
conn.create_secret(Name=DEFAULT_SECRET_NAME,
|
||||
SecretString='foosecret')
|
||||
|
||||
rotation_rules = {'AutomaticallyAfterDays': 1001}
|
||||
with assert_raises(ClientError):
|
||||
result = conn.rotate_secret(SecretId=secret_name,
|
||||
result = conn.rotate_secret(SecretId=DEFAULT_SECRET_NAME,
|
||||
RotationRules=rotation_rules)
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_put_secret_value_puts_new_secret():
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
put_secret_value_dict = conn.put_secret_value(SecretId=DEFAULT_SECRET_NAME,
|
||||
SecretString='foosecret',
|
||||
VersionStages=['AWSCURRENT'])
|
||||
version_id = put_secret_value_dict['VersionId']
|
||||
|
||||
get_secret_value_dict = conn.get_secret_value(SecretId=DEFAULT_SECRET_NAME,
|
||||
VersionId=version_id,
|
||||
VersionStage='AWSCURRENT')
|
||||
|
||||
assert get_secret_value_dict
|
||||
assert get_secret_value_dict['SecretString'] == 'foosecret'
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_put_secret_value_can_get_first_version_if_put_twice():
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
put_secret_value_dict = conn.put_secret_value(SecretId=DEFAULT_SECRET_NAME,
|
||||
SecretString='first_secret',
|
||||
VersionStages=['AWSCURRENT'])
|
||||
first_version_id = put_secret_value_dict['VersionId']
|
||||
conn.put_secret_value(SecretId=DEFAULT_SECRET_NAME,
|
||||
SecretString='second_secret',
|
||||
VersionStages=['AWSCURRENT'])
|
||||
|
||||
first_secret_value_dict = conn.get_secret_value(SecretId=DEFAULT_SECRET_NAME,
|
||||
VersionId=first_version_id)
|
||||
first_secret_value = first_secret_value_dict['SecretString']
|
||||
|
||||
assert first_secret_value == 'first_secret'
|
||||
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_put_secret_value_versions_differ_if_same_secret_put_twice():
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
put_secret_value_dict = conn.put_secret_value(SecretId=DEFAULT_SECRET_NAME,
|
||||
SecretString='dupe_secret',
|
||||
VersionStages=['AWSCURRENT'])
|
||||
first_version_id = put_secret_value_dict['VersionId']
|
||||
put_secret_value_dict = conn.put_secret_value(SecretId=DEFAULT_SECRET_NAME,
|
||||
SecretString='dupe_secret',
|
||||
VersionStages=['AWSCURRENT'])
|
||||
second_version_id = put_secret_value_dict['VersionId']
|
||||
|
||||
assert first_version_id != second_version_id
|
||||
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_can_list_secret_version_ids():
|
||||
conn = boto3.client('secretsmanager', region_name='us-west-2')
|
||||
put_secret_value_dict = conn.put_secret_value(SecretId=DEFAULT_SECRET_NAME,
|
||||
SecretString='dupe_secret',
|
||||
VersionStages=['AWSCURRENT'])
|
||||
first_version_id = put_secret_value_dict['VersionId']
|
||||
put_secret_value_dict = conn.put_secret_value(SecretId=DEFAULT_SECRET_NAME,
|
||||
SecretString='dupe_secret',
|
||||
VersionStages=['AWSCURRENT'])
|
||||
second_version_id = put_secret_value_dict['VersionId']
|
||||
|
||||
versions_list = conn.list_secret_version_ids(SecretId=DEFAULT_SECRET_NAME)
|
||||
|
||||
returned_version_ids = [v['VersionId'] for v in versions_list['Versions']]
|
||||
|
||||
assert [first_version_id, second_version_id].sort() == returned_version_ids.sort()
|
||||
|
||||
|
|
|
|||
|
|
@ -10,6 +10,8 @@ from moto import mock_secretsmanager
|
|||
Test the different server responses for secretsmanager
|
||||
'''
|
||||
|
||||
DEFAULT_SECRET_NAME = 'test-secret'
|
||||
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_get_secret_value():
|
||||
|
|
@ -18,19 +20,20 @@ def test_get_secret_value():
|
|||
test_client = backend.test_client()
|
||||
|
||||
create_secret = test_client.post('/',
|
||||
data={"Name": "test-secret",
|
||||
data={"Name": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foo-secret"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.CreateSecret"},
|
||||
)
|
||||
get_secret = test_client.post('/',
|
||||
data={"SecretId": "test-secret",
|
||||
"VersionStage": "AWSCURRENT"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.GetSecretValue"},
|
||||
)
|
||||
data={"SecretId": DEFAULT_SECRET_NAME,
|
||||
"VersionStage": "AWSCURRENT"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.GetSecretValue"},
|
||||
)
|
||||
|
||||
json_data = json.loads(get_secret.data.decode("utf-8"))
|
||||
|
||||
assert json_data['SecretString'] == 'foo-secret'
|
||||
|
||||
@mock_secretsmanager
|
||||
|
|
@ -55,7 +58,7 @@ def test_get_secret_that_does_not_match():
|
|||
test_client = backend.test_client()
|
||||
|
||||
create_secret = test_client.post('/',
|
||||
data={"Name": "test-secret",
|
||||
data={"Name": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foo-secret"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.CreateSecret"},
|
||||
|
|
@ -165,7 +168,7 @@ def test_describe_secret_that_does_not_match():
|
|||
test_client = backend.test_client()
|
||||
|
||||
create_secret = test_client.post('/',
|
||||
data={"Name": "test-secret",
|
||||
data={"Name": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foosecret"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.CreateSecret"
|
||||
|
|
@ -188,7 +191,7 @@ def test_rotate_secret():
|
|||
test_client = backend.test_client()
|
||||
|
||||
create_secret = test_client.post('/',
|
||||
data={"Name": "test-secret",
|
||||
data={"Name": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foosecret"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.CreateSecret"
|
||||
|
|
@ -197,7 +200,7 @@ def test_rotate_secret():
|
|||
|
||||
client_request_token = "EXAMPLE2-90ab-cdef-fedc-ba987SECRET2"
|
||||
rotate_secret = test_client.post('/',
|
||||
data={"SecretId": "test-secret",
|
||||
data={"SecretId": DEFAULT_SECRET_NAME,
|
||||
"ClientRequestToken": client_request_token},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.RotateSecret"
|
||||
|
|
@ -207,7 +210,7 @@ def test_rotate_secret():
|
|||
json_data = json.loads(rotate_secret.data.decode("utf-8"))
|
||||
assert json_data # Returned dict is not empty
|
||||
assert json_data['ARN'] != ''
|
||||
assert json_data['Name'] == 'test-secret'
|
||||
assert json_data['Name'] == DEFAULT_SECRET_NAME
|
||||
assert json_data['VersionId'] == client_request_token
|
||||
|
||||
# @mock_secretsmanager
|
||||
|
|
@ -289,7 +292,7 @@ def test_rotate_secret_that_does_not_match():
|
|||
test_client = backend.test_client()
|
||||
|
||||
create_secret = test_client.post('/',
|
||||
data={"Name": "test-secret",
|
||||
data={"Name": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foosecret"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.CreateSecret"
|
||||
|
|
@ -313,7 +316,7 @@ def test_rotate_secret_client_request_token_too_short():
|
|||
test_client = backend.test_client()
|
||||
|
||||
create_secret = test_client.post('/',
|
||||
data={"Name": "test-secret",
|
||||
data={"Name": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foosecret"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.CreateSecret"
|
||||
|
|
@ -322,7 +325,7 @@ def test_rotate_secret_client_request_token_too_short():
|
|||
|
||||
client_request_token = "ED9F8B6C-85B7-B7E4-38F2A3BEB13C"
|
||||
rotate_secret = test_client.post('/',
|
||||
data={"SecretId": "test-secret",
|
||||
data={"SecretId": DEFAULT_SECRET_NAME,
|
||||
"ClientRequestToken": client_request_token},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.RotateSecret"
|
||||
|
|
@ -339,7 +342,7 @@ def test_rotate_secret_client_request_token_too_long():
|
|||
test_client = backend.test_client()
|
||||
|
||||
create_secret = test_client.post('/',
|
||||
data={"Name": "test-secret",
|
||||
data={"Name": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foosecret"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.CreateSecret"
|
||||
|
|
@ -351,7 +354,7 @@ def test_rotate_secret_client_request_token_too_long():
|
|||
'ED9F8B6C-85B7-446A-B7E4-38F2A3BEB13C'
|
||||
)
|
||||
rotate_secret = test_client.post('/',
|
||||
data={"SecretId": "test-secret",
|
||||
data={"SecretId": DEFAULT_SECRET_NAME,
|
||||
"ClientRequestToken": client_request_token},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.RotateSecret"
|
||||
|
|
@ -368,7 +371,7 @@ def test_rotate_secret_rotation_lambda_arn_too_long():
|
|||
test_client = backend.test_client()
|
||||
|
||||
create_secret = test_client.post('/',
|
||||
data={"Name": "test-secret",
|
||||
data={"Name": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foosecret"},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.CreateSecret"
|
||||
|
|
@ -377,7 +380,7 @@ def test_rotate_secret_rotation_lambda_arn_too_long():
|
|||
|
||||
rotation_lambda_arn = '85B7-446A-B7E4' * 147 # == 2058 characters
|
||||
rotate_secret = test_client.post('/',
|
||||
data={"SecretId": "test-secret",
|
||||
data={"SecretId": DEFAULT_SECRET_NAME,
|
||||
"RotationLambdaARN": rotation_lambda_arn},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.RotateSecret"
|
||||
|
|
@ -389,7 +392,165 @@ def test_rotate_secret_rotation_lambda_arn_too_long():
|
|||
assert json_data['__type'] == 'InvalidParameterException'
|
||||
|
||||
|
||||
#
|
||||
|
||||
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_put_secret_value_puts_new_secret():
|
||||
backend = server.create_backend_app('secretsmanager')
|
||||
test_client = backend.test_client()
|
||||
|
||||
test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foosecret",
|
||||
"VersionStages": ["AWSCURRENT"]},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.PutSecretValue"},
|
||||
)
|
||||
|
||||
put_second_secret_value_json = test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "foosecret",
|
||||
"VersionStages": ["AWSCURRENT"]},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.PutSecretValue"},
|
||||
)
|
||||
second_secret_json_data = json.loads(put_second_secret_value_json.data.decode("utf-8"))
|
||||
|
||||
version_id = second_secret_json_data['VersionId']
|
||||
|
||||
secret_value_json = test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"VersionId": version_id,
|
||||
"VersionStage": 'AWSCURRENT'},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.GetSecretValue"},
|
||||
)
|
||||
|
||||
second_secret_json_data = json.loads(secret_value_json.data.decode("utf-8"))
|
||||
|
||||
assert second_secret_json_data
|
||||
assert second_secret_json_data['SecretString'] == 'foosecret'
|
||||
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_put_secret_value_can_get_first_version_if_put_twice():
|
||||
backend = server.create_backend_app('secretsmanager')
|
||||
test_client = backend.test_client()
|
||||
|
||||
first_secret_string = 'first_secret'
|
||||
second_secret_string = 'second_secret'
|
||||
|
||||
put_first_secret_value_json = test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"SecretString": first_secret_string,
|
||||
"VersionStages": ["AWSCURRENT"]},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.PutSecretValue"},
|
||||
)
|
||||
|
||||
first_secret_json_data = json.loads(put_first_secret_value_json.data.decode("utf-8"))
|
||||
|
||||
first_secret_version_id = first_secret_json_data['VersionId']
|
||||
|
||||
test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"SecretString": second_secret_string,
|
||||
"VersionStages": ["AWSCURRENT"]},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.PutSecretValue"},
|
||||
)
|
||||
|
||||
get_first_secret_value_json = test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"VersionId": first_secret_version_id,
|
||||
"VersionStage": 'AWSCURRENT'},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.GetSecretValue"},
|
||||
)
|
||||
|
||||
get_first_secret_json_data = json.loads(get_first_secret_value_json.data.decode("utf-8"))
|
||||
|
||||
assert get_first_secret_json_data
|
||||
assert get_first_secret_json_data['SecretString'] == first_secret_string
|
||||
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_put_secret_value_versions_differ_if_same_secret_put_twice():
|
||||
backend = server.create_backend_app('secretsmanager')
|
||||
test_client = backend.test_client()
|
||||
|
||||
put_first_secret_value_json = test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "secret",
|
||||
"VersionStages": ["AWSCURRENT"]},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.PutSecretValue"},
|
||||
)
|
||||
first_secret_json_data = json.loads(put_first_secret_value_json.data.decode("utf-8"))
|
||||
first_secret_version_id = first_secret_json_data['VersionId']
|
||||
|
||||
put_second_secret_value_json = test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "secret",
|
||||
"VersionStages": ["AWSCURRENT"]},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.PutSecretValue"},
|
||||
)
|
||||
second_secret_json_data = json.loads(put_second_secret_value_json.data.decode("utf-8"))
|
||||
second_secret_version_id = second_secret_json_data['VersionId']
|
||||
|
||||
assert first_secret_version_id != second_secret_version_id
|
||||
|
||||
|
||||
@mock_secretsmanager
|
||||
def test_can_list_secret_version_ids():
|
||||
backend = server.create_backend_app('secretsmanager')
|
||||
test_client = backend.test_client()
|
||||
|
||||
put_first_secret_value_json = test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "secret",
|
||||
"VersionStages": ["AWSCURRENT"]},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.PutSecretValue"},
|
||||
)
|
||||
first_secret_json_data = json.loads(put_first_secret_value_json.data.decode("utf-8"))
|
||||
first_secret_version_id = first_secret_json_data['VersionId']
|
||||
put_second_secret_value_json = test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME,
|
||||
"SecretString": "secret",
|
||||
"VersionStages": ["AWSCURRENT"]},
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.PutSecretValue"},
|
||||
)
|
||||
second_secret_json_data = json.loads(put_second_secret_value_json.data.decode("utf-8"))
|
||||
second_secret_version_id = second_secret_json_data['VersionId']
|
||||
|
||||
list_secret_versions_json = test_client.post('/',
|
||||
data={
|
||||
"SecretId": DEFAULT_SECRET_NAME, },
|
||||
headers={
|
||||
"X-Amz-Target": "secretsmanager.ListSecretVersionIds"},
|
||||
)
|
||||
|
||||
versions_list = json.loads(list_secret_versions_json.data.decode("utf-8"))
|
||||
|
||||
returned_version_ids = [v['VersionId'] for v in versions_list['Versions']]
|
||||
|
||||
assert [first_secret_version_id, second_secret_version_id].sort() == returned_version_ids.sort()
|
||||
|
||||
#
|
||||
# The following tests should work, but fail on the embedded dict in
|
||||
# RotationRules. The error message suggests a problem deeper in the code, which
|
||||
# needs further investigation.
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue