use crate::types::keyvault::*;
use crate::{AzureHttpClient, Result};
use urlencoding::encode;
pub struct KeyvaultOps<'a> {
pub(crate) client: &'a AzureHttpClient,
}
impl<'a> KeyvaultOps<'a> {
pub(crate) fn new(client: &'a AzureHttpClient) -> Self {
Self { client }
}
fn base_url(&self) -> &str {
#[cfg(any(test, feature = "test-support"))]
{
if let Some(ref base) = self.client.base_url {
return base.trim_end_matches('/');
}
}
"https://management.azure.com"
}
#[allow(dead_code)]
pub(crate) async fn list_vaults(&self, subscription_id: &str) -> Result<VaultListResult> {
let url = format!(
"{}/subscriptions/{}/providers/Microsoft.KeyVault/vaults",
self.base_url(),
encode(subscription_id),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let response = self.client.get(&url).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read list_vaults response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse list_vaults response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
#[allow(dead_code)]
pub(crate) async fn list_vaults_in_group(
&self,
subscription_id: &str,
resource_group_name: &str,
) -> Result<VaultListResult> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let response = self.client.get(&url).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read list_vaults_in_group response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse list_vaults_in_group response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
#[allow(dead_code)]
pub(crate) async fn get_vault(
&self,
subscription_id: &str,
resource_group_name: &str,
vault_name: &str,
) -> Result<Vault> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
encode(vault_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let response = self.client.get(&url).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read get_vault response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse get_vault response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
#[allow(dead_code)]
pub(crate) async fn create_vault(
&self,
subscription_id: &str,
resource_group_name: &str,
vault_name: &str,
body: &VaultCreateRequest,
) -> Result<Vault> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
encode(vault_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let body_bytes =
serde_json::to_vec(body).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to serialize create_vault request: {e}"),
body: None,
})?;
let response = self.client.put(&url, &body_bytes).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read create_vault response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse create_vault response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
#[allow(dead_code)]
pub(crate) async fn delete_vault(
&self,
subscription_id: &str,
resource_group_name: &str,
vault_name: &str,
) -> Result<()> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
encode(vault_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let response = self.client.delete(&url).await?;
response.error_for_status().await?;
Ok(())
}
#[allow(dead_code)]
pub(crate) async fn list_secrets(
&self,
subscription_id: &str,
resource_group_name: &str,
vault_name: &str,
) -> Result<SecretListResult> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}/secrets",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
encode(vault_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let response = self.client.get(&url).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read list_secrets response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse list_secrets response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
#[allow(dead_code)]
pub(crate) async fn get_secret(
&self,
subscription_id: &str,
resource_group_name: &str,
vault_name: &str,
secret_name: &str,
) -> Result<Secret> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}/secrets/{}",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
encode(vault_name),
encode(secret_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let response = self.client.get(&url).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read get_secret response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse get_secret response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
#[allow(dead_code)]
pub(crate) async fn set_secret(
&self,
subscription_id: &str,
resource_group_name: &str,
vault_name: &str,
secret_name: &str,
body: &SecretCreateRequest,
) -> Result<Secret> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}/secrets/{}",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
encode(vault_name),
encode(secret_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let body_bytes =
serde_json::to_vec(body).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to serialize set_secret request: {e}"),
body: None,
})?;
let response = self.client.put(&url, &body_bytes).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read set_secret response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse set_secret response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
#[allow(dead_code)]
pub(crate) async fn list_keys(
&self,
subscription_id: &str,
resource_group_name: &str,
vault_name: &str,
) -> Result<KeyListResult> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}/keys",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
encode(vault_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let response = self.client.get(&url).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read list_keys response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse list_keys response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
#[allow(dead_code)]
pub(crate) async fn get_key(
&self,
subscription_id: &str,
resource_group_name: &str,
vault_name: &str,
key_name: &str,
) -> Result<Key> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}/keys/{}",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
encode(vault_name),
encode(key_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let response = self.client.get(&url).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read get_key response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse get_key response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
#[allow(dead_code)]
pub(crate) async fn create_key(
&self,
subscription_id: &str,
resource_group_name: &str,
vault_name: &str,
key_name: &str,
body: &KeyCreateRequest,
) -> Result<Key> {
let url = format!(
"{}/subscriptions/{}/resourceGroups/{}/providers/Microsoft.KeyVault/vaults/{}/keys/{}",
self.base_url(),
encode(subscription_id),
encode(resource_group_name),
encode(vault_name),
encode(key_name),
);
let sep = if url.contains('?') { "&" } else { "?" };
let url = format!("{}{}api-version=2023-07-01", url, sep);
let body_bytes =
serde_json::to_vec(body).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to serialize create_key request: {e}"),
body: None,
})?;
let response = self.client.put(&url, &body_bytes).await?;
let response = response.error_for_status().await?;
let response_bytes =
response
.bytes()
.await
.map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to read create_key response: {e}"),
body: None,
})?;
serde_json::from_slice(&response_bytes).map_err(|e| crate::AzureError::InvalidResponse {
message: format!("Failed to parse create_key response: {e}"),
body: Some(String::from_utf8_lossy(&response_bytes).to_string()),
})
}
}
#[cfg(test)]
mod tests {
use super::*;
#[tokio::test]
async fn test_list_vaults() {
let mut mock = crate::MockClient::new();
mock.expect_get("/subscriptions/test-subscriptionId/providers/Microsoft.KeyVault/vaults")
.returning_json(serde_json::to_value(VaultListResult::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let result = ops.list_vaults("test-subscriptionId").await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_list_vaults_in_group() {
let mut mock = crate::MockClient::new();
mock.expect_get("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults")
.returning_json(serde_json::to_value(VaultListResult::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let result = ops
.list_vaults_in_group("test-subscriptionId", "test-resourceGroupName")
.await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_get_vault() {
let mut mock = crate::MockClient::new();
mock.expect_get("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults/test-vaultName")
.returning_json(serde_json::to_value(Vault::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let result = ops
.get_vault(
"test-subscriptionId",
"test-resourceGroupName",
"test-vaultName",
)
.await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_create_vault() {
let mut mock = crate::MockClient::new();
mock.expect_put("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults/test-vaultName")
.returning_json(serde_json::to_value(Vault::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let body = VaultCreateRequest::fixture();
let result = ops
.create_vault(
"test-subscriptionId",
"test-resourceGroupName",
"test-vaultName",
&body,
)
.await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_delete_vault() {
let mut mock = crate::MockClient::new();
mock.expect_delete("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults/test-vaultName")
.returning_json(serde_json::json!({}));
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let result = ops
.delete_vault(
"test-subscriptionId",
"test-resourceGroupName",
"test-vaultName",
)
.await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_list_secrets() {
let mut mock = crate::MockClient::new();
mock.expect_get("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults/test-vaultName/secrets")
.returning_json(serde_json::to_value(SecretListResult::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let result = ops
.list_secrets(
"test-subscriptionId",
"test-resourceGroupName",
"test-vaultName",
)
.await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_get_secret() {
let mut mock = crate::MockClient::new();
mock.expect_get("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults/test-vaultName/secrets/test-secretName")
.returning_json(serde_json::to_value(Secret::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let result = ops
.get_secret(
"test-subscriptionId",
"test-resourceGroupName",
"test-vaultName",
"test-secretName",
)
.await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_set_secret() {
let mut mock = crate::MockClient::new();
mock.expect_put("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults/test-vaultName/secrets/test-secretName")
.returning_json(serde_json::to_value(Secret::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let body = SecretCreateRequest::fixture();
let result = ops
.set_secret(
"test-subscriptionId",
"test-resourceGroupName",
"test-vaultName",
"test-secretName",
&body,
)
.await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_list_keys() {
let mut mock = crate::MockClient::new();
mock.expect_get("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults/test-vaultName/keys")
.returning_json(serde_json::to_value(KeyListResult::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let result = ops
.list_keys(
"test-subscriptionId",
"test-resourceGroupName",
"test-vaultName",
)
.await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_get_key() {
let mut mock = crate::MockClient::new();
mock.expect_get("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults/test-vaultName/keys/test-keyName")
.returning_json(serde_json::to_value(Key::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let result = ops
.get_key(
"test-subscriptionId",
"test-resourceGroupName",
"test-vaultName",
"test-keyName",
)
.await;
assert!(result.is_ok());
}
#[tokio::test]
async fn test_create_key() {
let mut mock = crate::MockClient::new();
mock.expect_put("/subscriptions/test-subscriptionId/resourceGroups/test-resourceGroupName/providers/Microsoft.KeyVault/vaults/test-vaultName/keys/test-keyName")
.returning_json(serde_json::to_value(Key::fixture()).unwrap());
let client = crate::AzureHttpClient::from_mock(mock);
let ops = KeyvaultOps::new(&client);
let body = KeyCreateRequest::fixture();
let result = ops
.create_key(
"test-subscriptionId",
"test-resourceGroupName",
"test-vaultName",
"test-keyName",
&body,
)
.await;
assert!(result.is_ok());
}
}