/
Add-DatabricksSecretScope.tests.ps1
47 lines (40 loc) · 1.61 KB
/
Add-DatabricksSecretScope.tests.ps1
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
param(
[ValidateSet('Bearer','ServicePrincipal')][string]$Mode="Bearer"
)
Set-Location $PSScriptRoot
Import-Module "..\azure.databricks.cicd.tools.psd1" -Force
$Config = (Get-Content '.\config.json' | ConvertFrom-Json)
switch ($mode){
("Bearer"){
Connect-Databricks -Region $Config.Region -BearerToken $Config.BearerToken
}
("ServicePrincipal"){
# Connect-Databricks -Region $Config.Region -DatabricksOrgId $Config.DatabricksOrgId -ApplicationId $Config.ApplicationId -Secret $Config.Secret -TenantId $Config.TenantId
Connect-Databricks -Region $Config.Region -ApplicationId $Config.ApplicationId -Secret $Config.Secret `
-ResourceGroupName $Config.ResourceGroupName `
-SubscriptionId $Config.SubscriptionId `
-WorkspaceName $Config.WorkspaceName `
-TenantId $Config.TenantId
}
}
$ResID = $Config.KeyVault
Describe "Add-DatabricksSecretScope" {
BeforeAll{
Remove-DatabricksSecretScope -ScopeName "Normal"
Remove-DatabricksSecretScope -ScopeName "KVScope"
}
It "Simple addition"{
Add-DatabricksSecretScope -ScopeName "Normal" -Verbose
}
It "All User Access"{
Add-DatabricksSecretScope -ScopeName "NormalWithPermissions" -AllUserAccess -Verbose
}
It "Key Vault addition"{
if ($Mode -eq "Bearer"){
{Add-DatabricksSecretScope -ScopeName "KVScope" -KeyVaultResourceId $ResID -Verbose} | Should Throw
}
else{
{Add-DatabricksSecretScope -ScopeName "KVScope" -KeyVaultResourceId $ResID -Verbose} | Should Not Throw
}
}
}