-
Notifications
You must be signed in to change notification settings - Fork 301
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tests | Remove hardcoded credentials from ManualTests #3090
Tests | Remove hardcoded credentials from ManualTests #3090
Conversation
One test implied that DataTestUtility.AKVUrl would point to an RSA key which aligned with the certificate's private key. Switching this to dynamically generate the key in places.
These were mostly related to generating CSP keys.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Absolutely fantastic! Just a few changes I'd like to see made, but otherwise I fully support these changes!
src/Microsoft.Data.SqlClient/tests/ManualTests/AlwaysEncrypted/TestFixtures/DatabaseHelper.cs
Outdated
Show resolved
Hide resolved
src/Microsoft.Data.SqlClient/tests/ManualTests/AlwaysEncrypted/TestFixtures/SQLSetupStrategy.cs
Outdated
Show resolved
Hide resolved
...Data.SqlClient/tests/ManualTests/AlwaysEncrypted/TestFixtures/SQLSetupStrategyCspProvider.cs
Outdated
Show resolved
Hide resolved
...Data.SqlClient/tests/ManualTests/AlwaysEncrypted/TestFixtures/SQLSetupStrategyCspProvider.cs
Show resolved
Hide resolved
src/Microsoft.Data.SqlClient/tests/ManualTests/AlwaysEncrypted/TestTrustedMasterKeyPaths.cs
Outdated
Show resolved
Hide resolved
@@ -31,11 +34,11 @@ private async Task<AccessToken> AcquireTokenAsync() | |||
{ | |||
// Added to reduce HttpClient calls. | |||
// For multi-user support, a better design can be implemented as needed. | |||
if (_akvUrl != DataTestUtility.AKVUrl) | |||
if (_akvUrl != AKVUrl) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
as far as I can tell this variable isn't being used to do anything other than indicate that the token has been acquired. If that's true, I'd recommend either making it a bool or checking _authority
/_resource
for null
as the check.
But I'm also wondering, can we store the access token itself? Or does that need to be re-acquired each time the call to this method is made? If we can store the access token, we could use _accessToken
as the value to check here (plus we could get rid of _authority
and _resource
.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I agree. AKVUrl was used all over the place for a static AKV credential, this was the last referenced location. It's now gone!
I'm not sure about the impact that caching the access token could have on test coverage - only the first test to run would ever be able to exercise the case where the AKV access token can't be retrieved. I think it'd be better to explicitly add a TokenCredential derivative which throws and run some of the AKV tests based on that, then revisit any caching.
...lClient/tests/tools/Microsoft.Data.SqlClient.TestUtilities/Fixtures/CspCertificateFixture.cs
Outdated
Show resolved
Hide resolved
...s/tools/Microsoft.Data.SqlClient.TestUtilities/Fixtures/ColumnMasterKeyCertificateFixture.cs
Outdated
Show resolved
Hide resolved
* Reorder properties and constructors * Move AEConnectionStringProviderWithCspParameters to its own file * Tweak to the AKV token acquisition
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Fantastic, thank you for addressing the comments :D
src/Microsoft.Data.SqlClient/tests/ManualTests/DataCommon/SqlClientCustomTokenCredential.cs
Outdated
Show resolved
Hide resolved
...crosoft.Data.SqlClient/tests/ManualTests/Microsoft.Data.SqlClient.ManualTesting.Tests.csproj
Show resolved
Hide resolved
/azp run |
Redundant bracket, alphabetised the ManualTesting csproj
Thanks - I've just resolved both comments. Won't the AE tests only run against a branch in this repo? |
/azp run |
Azure Pipelines successfully started running 1 pipeline(s). |
@edwardneal ... uhhh good question. I don't think it will... :/ I'm quickly getting tired of these rules that prevent us from running all our tests against external branches 😠 |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## main #3090 +/- ##
==========================================
- Coverage 72.81% 66.18% -6.64%
==========================================
Files 282 279 -3
Lines 59112 58827 -285
==========================================
- Hits 43045 38936 -4109
- Misses 16067 19891 +3824
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
Thanks @benrr101, that's fine by me |
Consider this my approval ... closing and rebuilding as #3204 Rereading my original plan I have no idea what I meant... So let's just follow the pattern that was working before. |
This PR mops up almost all of the remaining hardcoded credentials, and does three things:
CertificateUtility.CreateCertificate
, which always used a hardcoded certificate.CertificateUtilityWin
inCspProviderExt
, then the class itself.Removal of hardcoded credentials
The removal of CertificateUtility.CreateCertificate is pretty uncontroversial. However, the
AKVTest.TestRoundTripWithAKVAndCertStoreProvider
test tries to round-trip encrypted column data, encrypting it with the hardcoded certificate and decrypting it with the Azure Key Vault key. I've thus treated this key as another static credential and removed it.It's worth noting that the
CoreCryptoTests
class loads hardcoded credentials from TCECryptoNativeBaselineRsa.txt. I've not touched this because I don't know what to do with it. It isn't testing any SqlClient-specific functionality, just .NET's ability to decrypt text which is encrypted by native code. I'm not sure whether this is necessary any more though: we already test this implicitly with the end-to-end AE tests. There's no modification required here - just a choice on whether to keep or delete the test entirely.CspProviderExt tests
One partially-related change was to remove CertificateUtilityWin. This was only ever used by the
CspProviderExt
tests, which used RSACryptoServiceProvider to generate a key in a specific CSP and encrypt/decrypt data with it. This consisted of three tests:Tests 1 and 3 are actually identical. "Microsoft Enhanced RSA and AES Cryptographic Provider" is the only CSP which fits the criteria for Test 1. I've thus eliminated test 1, and modified test 3 to run against all matching CSPs.
Of the remaining two tests, TestEncryptDecryptWithCSP would run a PowerShell script to generate a certificate, then extract the private key and use this as the CSP. It didn't need to do this, it could simply instantiate an RSACryptoServiceProvider directly and use that. I've thus eliminated the certificate generation. The round-trip test did need the certificate though, so I've just switched it to use the same certificate generation fixture as the rest of the tests. It still fails if I force it to run, but it fails with the same error as before. Once these changes were done, CertificateUtilityWin was no longer referenced and could be deleted wholesale.
The CspProviderExt/CertificateUtilityWin changes comprise around half of the changes. If it's easier to review, I can split them into a separate PR.