Skip to content

Commit d80c022

Browse files
authored
Add rdbms flexible-server tests (Azure#14703)
1 parent b791d51 commit d80c022

10 files changed

+9256
-2
lines changed

sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/mysql_flexibleservers/operations/_operations.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ def __init__(self, client, config, serializer, deserializer):
3535
self._client = client
3636
self._serialize = serializer
3737
self._deserialize = deserializer
38-
self.api_version = "2020-07-01-privatepreview"
38+
self.api_version = "2017-12-01"
3939

4040
self.config = config
4141

sdk/rdbms/azure-mgmt-rdbms/azure/mgmt/rdbms/postgresql_flexibleservers/operations/_operations.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ def __init__(self, client, config, serializer, deserializer):
3535
self._client = client
3636
self._serialize = serializer
3737
self._deserialize = deserializer
38-
self.api_version = "2020-02-14-preview"
38+
self.api_version = "2017-12-01"
3939

4040
self.config = config
4141

sdk/rdbms/azure-mgmt-rdbms/tests/__init__.py

Whitespace-only changes.
Lines changed: 88 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,88 @@
1+
def flexible_server_firewall_rule_mgmt_test(instance, resource_group_name, server_name):
2+
firewall_rule_name = server_name + "-testfirewallrule"
3+
start_ip_address = "0.0.0.0"
4+
end_ip_address = "255.255.255.255"
5+
new_start_ip_address = "12.12.12.12"
6+
new_end_ip_address = "233.233.233.233"
7+
8+
result = instance.mgmt_client.firewall_rules.create_or_update(resource_group_name, server_name, firewall_rule_name, start_ip_address, end_ip_address)
9+
result = result.result()
10+
instance.assertEqual(result.start_ip_address, start_ip_address)
11+
instance.assertEqual(result.end_ip_address, end_ip_address)
12+
13+
result = instance.mgmt_client.firewall_rules.create_or_update(resource_group_name, server_name, firewall_rule_name, new_start_ip_address, end_ip_address)
14+
result = result.result()
15+
instance.assertEqual(result.start_ip_address, new_start_ip_address)
16+
17+
result = instance.mgmt_client.firewall_rules.create_or_update(resource_group_name, server_name, firewall_rule_name, new_start_ip_address, new_end_ip_address)
18+
result = result.result()
19+
instance.assertEqual(result.end_ip_address, new_end_ip_address)
20+
21+
result = instance.mgmt_client.firewall_rules.list_by_server(resource_group_name, server_name)
22+
instance.assertIsNotNone(result)
23+
24+
result = instance.mgmt_client.firewall_rules.get(resource_group_name, server_name, firewall_rule_name)
25+
26+
result = instance.mgmt_client.firewall_rules.delete(resource_group_name, server_name, firewall_rule_name)
27+
result = result.result()
28+
29+
30+
def flexible_server_configuration_mgmt_test(instance, resource_group_name, server_name, config_key_name, default_value, user_value):
31+
32+
result = instance.mgmt_client.configurations.list_by_server(resource_group_name, server_name)
33+
instance.assertIsNotNone(result)
34+
35+
result = instance.mgmt_client.configurations.get(resource_group_name, server_name, config_key_name)
36+
instance.assertTrue(result.value, default_value)
37+
instance.assertTrue(result.source, "system-default")
38+
39+
result = instance.mgmt_client.configurations.update(resource_group_name, server_name, config_key_name, value=user_value, source='user-override')
40+
result = result.result()
41+
instance.assertTrue(result.value, user_value)
42+
instance.assertTrue(result.source, "user-override")
43+
44+
45+
def flexible_server_database_mgmt_test(instance, resource_group_name, server_name):
46+
database_name = "testdatabase"
47+
result = instance.mgmt_client.databases.create_or_update(resource_group_name, server_name, database_name, charset='utf8', collation='utf8_general_ci')
48+
result = result.result()
49+
instance.assertEqual(result.name, database_name)
50+
instance.assertEqual(result.charset, 'utf8')
51+
instance.assertEqual(result.collation, 'utf8_general_ci')
52+
53+
result = instance.mgmt_client.databases.get(resource_group_name, server_name, database_name)
54+
55+
result = instance.mgmt_client.databases.list_by_server(resource_group_name, server_name)
56+
instance.assertIsNotNone(result)
57+
58+
result = instance.mgmt_client.databases.delete(resource_group_name, server_name, database_name)
59+
result = result.result()
60+
61+
def flexible_server_serverkey_mgmt_test(instance, resource_group_name, server_name, vault, key_client):
62+
parameters = azure.mgmt.rdbms.mysql_flexibleservers.models.Server(
63+
location=instance.location,
64+
identity = azure.mgmt.rdbms.mysql_flexibleservers.models.Identity(
65+
type=azure.mgmt.rdbms.mysql_flexibleservers.models.ResourceIdentityType.system_assigned.value))
66+
result = instance.mgmt_client.servers.update(resource_group_name, server_name, parameters)
67+
result = result.result()
68+
server_identity = result.identity.principal_id
69+
70+
key = key_client.create_key(key_name, "RSA")
71+
kid = key.kid
72+
# self.cmd('keyvault set-policy -g {} -n {} --object-id {} --key-permissions wrapKey unwrapKey get list'
73+
# .format(resource_group, vault_name, server_identity))
74+
75+
key_name = instance._get_server_key_name_from_uri(kid)
76+
77+
result = instance.mgmt_client.server_keys.create_or_update(resource_group_name, server_name, key_name, uri=kid)
78+
result = result.result()
79+
print(vars(result))
80+
81+
result = instance.mgmt_client.server_keys.get(resource_group_name, server_name, key_name)
82+
print(vars(result))
83+
84+
result = instance.mgmt_client.server_keys.list_by_server(resource_group_name, server_name)
85+
print(list(result))
86+
87+
result = instance.mgmt_client.server_keys.delete(resource_group_name, server_name, key_name)
88+
result = result.result()

0 commit comments

Comments
 (0)