internal void CreateStoredAccessPolicy(string policyName, string permission, DateTime?startTime, DateTime?expiryTime, CloudQueue queue, bool ifCleanUpPolicy = true) { if (ifCleanUpPolicy) { Utility.ClearStoredAccessPolicy <CloudQueue>(queue); } Test.Assert(CommandAgent.NewAzureStorageQueueStoredAccessPolicy(queue.Name, policyName, permission, startTime, expiryTime), "Create stored access policy in queue should succeed"); Test.Info("Created stored access policy:{0}", policyName); }
internal void SetStoredAccessPolicyAndValidate(Utility.RawStoredAccessPolicy policy1, Utility.RawStoredAccessPolicy policy2, string queueName = null, bool ifCleanupPolicy = true, bool ifCleanupQueue = true) { CloudQueue queue = queueUtil.CreateQueue(queueName); if (ifCleanupPolicy) { Utility.ClearStoredAccessPolicy <CloudQueue>(queue); } policy2.PolicyName = policy1.PolicyName; try { CommandAgent.NewAzureStorageQueueStoredAccessPolicy(queue.Name, policy1.PolicyName, policy1.Permission, policy1.StartTime, policy1.ExpiryTime); Test.Assert(CommandAgent.SetAzureStorageQueueStoredAccessPolicy(queue.Name, policy2.PolicyName, policy2.Permission, policy2.StartTime, policy2.ExpiryTime), "Set stored access policy in queue should succeed"); Test.Info("Set stored access policy:{0}", policy2.PolicyName); //get the policy and validate SharedAccessQueuePolicies expectedPolicies = new SharedAccessQueuePolicies(); if (policy2.StartTime == null) { policy2.StartTime = policy1.StartTime; } if (policy2.ExpiryTime == null) { policy2.ExpiryTime = policy1.ExpiryTime; } if (policy2.Permission == null) { policy2.Permission = policy1.Permission; } expectedPolicies.Add(policy2.PolicyName, Utility.SetupSharedAccessPolicy <SharedAccessQueuePolicy>(policy2.StartTime, policy2.ExpiryTime, policy2.Permission)); Utility.WaitForPolicyBecomeValid <CloudQueue>(queue, policy2); Utility.ValidateStoredAccessPolicies <SharedAccessQueuePolicy>(queue.GetPermissions().SharedAccessPolicies, expectedPolicies); //validate the output SharedAccessQueuePolicy policy = Utility.SetupSharedAccessPolicy <SharedAccessQueuePolicy>(policy2.StartTime, policy2.ExpiryTime, policy2.Permission); Collection <Dictionary <string, object> > comp = new Collection <Dictionary <string, object> >(); comp.Add(Utility.ConstructGetPolicyOutput <SharedAccessQueuePolicy>(policy, policy2.PolicyName)); CommandAgent.OutputValidation(comp); } finally { if (ifCleanupQueue) { queueUtil.RemoveQueue(queue); } } }
public void NewPolicyInvalidParameter() { DateTime? startTime = DateTime.Today.AddDays(1); DateTime? expiryTime = DateTime.Today.AddDays(-1); CloudQueue queue = queueUtil.CreateQueue(); Utility.ClearStoredAccessPolicy <CloudQueue>(queue); try { Test.Assert(!CommandAgent.NewAzureStorageQueueStoredAccessPolicy("CONTAINER", Utility.GenNameString("p", 5), null, null, null), "Create stored acess policy for invalid queue name CONTAINER should fail"); if (lang == Language.PowerShell) { ExpectedContainErrorMessage("The specifed resource name contains invalid characters."); } else { ExpectedContainErrorMessage("Queue name format is incorrect"); } Test.Assert(!CommandAgent.NewAzureStorageQueueStoredAccessPolicy(queue.Name, Utility.GenNameString("p", 5), null, startTime, expiryTime), "Create stored access policy for ExpiryTime earlier than StartTime should fail"); ExpectedContainErrorMessage("The expiry time of the specified access policy should be greater than start time"); Test.Assert(!CommandAgent.NewAzureStorageQueueStoredAccessPolicy(queue.Name, Utility.GenNameString("p", 5), null, startTime, startTime), "Create stored access policy for ExpiryTime same as StartTime should fail"); ExpectedContainErrorMessage("The expiry time of the specified access policy should be greater than start time"); Test.Assert(!CommandAgent.NewAzureStorageQueueStoredAccessPolicy(queue.Name, Utility.GenNameString("p", 5), "x", null, null), "Create stored access policy with invalid permission should fail"); if (lang == Language.PowerShell) { ExpectedContainErrorMessage("Invalid access permission"); } else { ExpectedContainErrorMessage("Given \"x\" is invalid, supported values are: r, a, u, p"); } Test.Assert(!CommandAgent.NewAzureStorageQueueStoredAccessPolicy(queue.Name, FileNamingGenerator.GenerateValidASCIIOptionValue(65), null, null, null), "Create stored access policy with invalid name length should fail"); if (lang == Language.PowerShell) { ExpectedContainErrorMessage("Valid names should be 1 through 64 characters long."); } else { ExpectedContainErrorMessage("Reason: Signed identifier ID cannot be empty or over 64 characters in length"); } for (int i = 1; i <= 5; i++) { CommandAgent.NewAzureStorageQueueStoredAccessPolicy(queue.Name, Utility.GenNameString("p", i), null, null, null); } Test.Assert(!CommandAgent.NewAzureStorageQueueStoredAccessPolicy(queue.Name, Utility.GenNameString("p", 6), null, null, null), "Create more than 5 stored access policies should fail"); if (lang == Language.PowerShell) { ExpectedContainErrorMessage("Too many '6' shared access policy identifiers provided"); } else { ExpectedContainErrorMessage("A maximum of 5 access policies may be set"); } string queueName = Utility.GenNameString("queue"); queueUtil.RemoveQueue(queueName); Test.Assert(!CommandAgent.NewAzureStorageQueueStoredAccessPolicy(queueName, Utility.GenNameString("p", 5), null, null, null), "Create stored access policy against non-existing container should fail"); if (lang == Language.PowerShell) { ExpectedContainErrorMessage("does not exist"); } else { ExpectedContainErrorMessage("The specified queue does not exist"); } } finally { queueUtil.RemoveQueue(queue); } }